Network Infrastructure Security Guidance, March 2022 (PP-22-0266 Version 1.0)
This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.
#cisco #docs
This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.
#cisco #docs
👍2
1646228506913.pdf
906.6 KB
Network Infrastructure Security Guidance, March 2022 (PP-22-0266 Version 1.0)
👍1
A collection of Windows Server 2019 and Windows 10 hardening noscripts
GitHub
https://github.com/atlantsecurity/windows-hardening-noscripts
#windows #hardening
GitHub
https://github.com/atlantsecurity/windows-hardening-noscripts
#windows #hardening
👍6
Карты по сетевому стеку
+ Network Communication Protocols Map
+ OSI Layers
GitHub
https://gist.github.com/CMCDragonkai/14a21fc387b8ea6f585c882d0d0d9334
+ Network Communication Protocols Map
+ OSI Layers
GitHub
https://gist.github.com/CMCDragonkai/14a21fc387b8ea6f585c882d0d0d9334
👍4
Любителям бинарщины - разбор примера использования техники эксплуатации переполнения буфера для повышения привилегий в системе с кодом на С
https://blog.pentesteracademy.com/exploiting-buffer-overflow-vulnerability-to-do-privilege-escalation-4a1de492a8c5
https://blog.pentesteracademy.com/exploiting-buffer-overflow-vulnerability-to-do-privilege-escalation-4a1de492a8c5
Medium
Exploiting Buffer Overflow vulnerability to do Privilege Escalation
A buffer overflow occurs when the data provided to the program goes out of the allocated memory space and also corrupts the contents of…
❤2
Разбор эксплуатации CVE на домене контроллера от Rapid7, разработчика известного сканера безопасности
https://www.rapid7.com/blog/post/2022/02/14/dropping-files-on-a-domain-controller-using-cve-2021-43893/
#windows
https://www.rapid7.com/blog/post/2022/02/14/dropping-files-on-a-domain-controller-using-cve-2021-43893/
#windows
Rapid7
Dropping Files on a Domain Controller Using CVE-2021-43893 | Rapid7 Blog
Security analysts who have some knowledge of Active Directory and pentesting would know the concept of tickets. Kerberos, the default authentication mechanism in an AD, uses ticket-based authentication where a Key Distribution Center (KDC) grants a Ticket-Granting Ticket (TGT) to a user requesting access to a service or an account, which can then be redeemed to generate a service ticket (ST) to access a particular service, like an SQL account.
Golden Ticket attacks show how an attacker can keep accessing the domain admin by obtaining the NTLM hash of the "krbtgt" account.
Domain persistence is necessary for an analyst in the event the admin password gets changed. Persistence can also be achieved by using certificate-based authentication deployed in the Active Directory Certificate Service. One such method is the Golden Certificate Attack.
#windows
Golden Ticket attacks show how an attacker can keep accessing the domain admin by obtaining the NTLM hash of the "krbtgt" account.
Domain persistence is necessary for an analyst in the event the admin password gets changed. Persistence can also be achieved by using certificate-based authentication deployed in the Active Directory Certificate Service. One such method is the Golden Certificate Attack.
#windows
👍2🔥1
Free Pentester's Lab by PentersterAcademy (USA)
Sources
https://attackdefense.pentesteracademy.com/
#education #pentest
Sources
https://attackdefense.pentesteracademy.com/
#education #pentest
👍4
Team Qualys discovered a local privilege escalation vulnerability in PolicyKit’s (polkit) setuid tool pkexec that allows low-level users to run commands as privileged users.
According to Qualys, the vulnerability exists in the pkexec.c code that doesn’t handle the calling parameters count correctly and ends up trying to execute environment variables as commands. Thus, an attacker can craft environment variables in such a way that it will induce pkexec to execute arbitrary code.
We are using the older, vulnerable Ubuntu version 20.04 in this demonstration, which can be downloaded from Ubuntu’s old releases page.
#linux
According to Qualys, the vulnerability exists in the pkexec.c code that doesn’t handle the calling parameters count correctly and ends up trying to execute environment variables as commands. Thus, an attacker can craft environment variables in such a way that it will induce pkexec to execute arbitrary code.
We are using the older, vulnerable Ubuntu version 20.04 in this demonstration, which can be downloaded from Ubuntu’s old releases page.
#linux
🔥2
Microsoft has gradually increased the efficiency and effectiveness of its auditing facilities over the years. Modern Windows systems can log vast amounts of information with minimal system impact. With the corresponding decrease in the price of storage media, excuses to not enable and retain these critical pieces of evidence simply don’t stand up to scrutiny. Configuring adequate logging on Windows systems, and ideally aggregating those logs into a SIEM or other log aggregator, is a critical step toward ensuring that your environment is able to support an effective incident response.
This document provides an overview of some of the most important Windows logs and the events that are recorded there. As with all of our Analyst Reference documents, this PDF is intended to provide more detail than a cheat sheet while still being short enough to serve as a quick reference. The PDF also contains links to external resources for further reference.
#windows
This document provides an overview of some of the most important Windows logs and the events that are recorded there. As with all of our Analyst Reference documents, this PDF is intended to provide more detail than a cheat sheet while still being short enough to serve as a quick reference. The PDF also contains links to external resources for further reference.
#windows
👍5
Оказавшись в качестве заложников в текущей внешнеполитической и экономической ситуации, простые жители, граждане РФ и все кто прибывает на ее территории вынуждены готовиться противостоять текущим угрозам и нападкам
Ситуация на ИТ-рынке. Как противостоять санкциям
https://vc.ru/u/918761-aleksey-klushin/373880-situaciya-na-it-rynke-sankcii-srochnye-mery-chto-delat-s-riskami
Российские аналоги зарубежных сервисов для бизнеса
https://vc.ru/services/374000-rossiyskie-analogi-zarubezhnyh-servisov-dlya-biznesa-kotorye-ne-zablokiruyut
Что учесть владельцам сайтов?
https://vc.ru/marketing/374784-sankcii-i-mart-2022-v-rossii-chto-uchest-vladelcam-saytov
Бесплатные TLS-сертификаты обеспечат доступность сайтов
https://www.securitylab.ru/news/530440.php
Ресурсы которые могут быть заблокированы в РФ [update 06.03]
https://habr.com/ru/news/t/654547/
Гайд: работающие способы вывести деньги за рубеж
https://habr.com/ru/post/654155/
Ситуация на ИТ-рынке. Как противостоять санкциям
https://vc.ru/u/918761-aleksey-klushin/373880-situaciya-na-it-rynke-sankcii-srochnye-mery-chto-delat-s-riskami
Российские аналоги зарубежных сервисов для бизнеса
https://vc.ru/services/374000-rossiyskie-analogi-zarubezhnyh-servisov-dlya-biznesa-kotorye-ne-zablokiruyut
Что учесть владельцам сайтов?
https://vc.ru/marketing/374784-sankcii-i-mart-2022-v-rossii-chto-uchest-vladelcam-saytov
Бесплатные TLS-сертификаты обеспечат доступность сайтов
https://www.securitylab.ru/news/530440.php
Ресурсы которые могут быть заблокированы в РФ [update 06.03]
https://habr.com/ru/news/t/654547/
Гайд: работающие способы вывести деньги за рубеж
https://habr.com/ru/post/654155/
❤3👍2🤡1