AppSec Guy
150 subscribers
79 photos
9 videos
13 files
30 links
Download Telegram
Hackerone platformasida PII (shaxsni tasdiqlovchi ma'lumot) larga hechqanday ruxsatlarsiz kirish haqidagi hisobot topshirilganda, hisobot Critical darajada qabul qilinishi shart.

Bunday holatda CVSS zarar darajasini to'liq hisoblashga yordam berolmasligi mumkin* (Hackerone platformasi standartlari)


Bu degani zaiflik zarar darajasini CVSS aniq hisoblamaydi. Bu yangilikmas, ko'pchilik osmonga qarab o'lchaydi zararni)

Hackerone platform standarts - link
πŸ‘1🌚1
I'm Comment developer)
😁2
AppSec Guy
Just get some SIEM agent and reverse engineer it as your C2 implant...
Just tell Windows Defender to block EDR, like writing custom signatures to block EDR or taking advantage of Defender's features..
😁1
Keyingi examni tanlashga qiynalyotganlar uchun OSEE olgan akadan tavsiya
πŸ”₯4
Ropper-ng

- Binary import qilgan kutubxonani o'zi topadi;
- Binarydagi security featurelarni o'zi tekshiradi;
- Gadgetlarni Ropperdan ko'ra tezroq topadi (hozircha cheklangan);
- Bulky ROP chain o'rniga qo'lda topilgan kichkina, ishlatishga osonlarini topib beradi kutubxonalarga qarab (endi qo'shiladi).

Tool ishni tezlatishga qaratilgan, debugger bilan Ropperni bir paytta ochib qayta-qayta tekshirish o'rniga bitta tool orqali qurish uchun ROP chainlarni.

Keyinchalik JOP, COP larni qo'shishga harakat qilaman.


Github
7πŸ”₯2❀1πŸ‘1
Kim oladi TuranSec swag?)
1πŸ†’6πŸ‘€5🀝4
Explanation ni o'ziga explanation kerak
4😁4πŸ‘1πŸ‘€1
Red teaming != Pentesting
2πŸ‘6🀝2πŸ€”1
Media is too big
VIEW IN TELEGRAM
CVE-2018-9059 - Easy file share 7.2 SEH Stack based Buffer overflow (DEP bypass)

Qayta yozilgan yangi ROP chain bilan, internetda bunaqangi ixcham chain yo'q) VirtualProtect() qiyin ekan ancha. Keyinroq githubga qo'yaman.
1πŸ”₯5πŸ‘1🫑1
Media is too big
VIEW IN TELEGRAM
CVE-2017-8869 - MediaCoder 0.8.48.5888 - Local Buffer Overflow (SEH)

Eski exploitda reverse shell qaytarmasdi. Bad chars qiynadi lekin.
10πŸ”₯4❀3πŸ‘1
email qalay😎
7πŸ”₯14😁3
AppSec Guy
Red teaming != Pentesting
Pentesting != Red teaming
πŸ†’8
Aytishga arziydimi bilmadim lekin o'rta osiyoda birinchi bo'ldik OSEDdan keyin)
9❀12πŸ”₯11
ASLR yoniq bo'lganda debugging qilib kerakli function address topish o'rniga pwntools bilan address o'zini olsak bo'ladi:

#binary.sym.items() bu symbols list
mainf_address = binary.sym.main


Masalan GOT entrydan built-in function olish:

# GOT entry table list => binary.got.items()
stack_chk_failf = binary.got.__stack_chk_fail


Yana Stack smashing paytida odatda basic usuli Canary tokenni leak qilib, offset topib payloadda o'rniga qo'yish bo'lardi, ozgina g'alati lekin zo'r yo'li Stack smashingni tekshiradigan funksiyaga Smash bo'lganda call bo'ladi, call bo'ladigan addressni o'zini Main functionga o'zgartirib qo'ysak bo'ladi, shunda Stack canay bypass bo'ladi.

Qanday functionni addressini overwrite qilamiz?

GOT entry tableni overwrite qilish kerak.

Yana Format string bugga qo'lda payload yozish o'rniga pwn.binary.fmtstr dan foydalansa bo'ladi

Masalan %n bilan GOT entryda overwrite qilamiz:

payload = fmtstr_payload(8,{stack_chk_fail:main_function})


Tushinish qiyin lekin oson aslida, fmtstr_payload stack check function o'rniga main function ni addresini overwrite qilyabdi GOT entry addresiga yetib borib.

payload taxminan shunga o'xshash:

payload = p32(printf_got_address)
payload += b"%1111x" # integer kiritish
payload += b"%8$n" # tepada turgan integerni write qiladi 8ta byte dan keyin decimal qilib


Shunaqa qilib manual payloadni kichkina kod bilan avtomatlashtirsa bo'ladi.

P.S. ASLR yoniq bo'lsa qanaqa qilib absolute path olinadi binary.got da? Environment variable odatda memoryda .data sectionda teparoq addressda turadi, odatda shu yeri o'zgarmaydi, shundan foydalansa bo'ladi, agar PIE bilan link qilingan bo'lsa .data section gayam tasir qiladi Chatgpt aytishi bo'yicha, unda bizda format string bug bor) ASLR 101% bypass qilinadi to'g'ri offset lar bilan/

Hozirgi tushuntirilgan narsani qilish uchun kodda 2ta binary ishlatganman, localdagi binarydan offset uchun address olib keyin offset hisoblab remote huddi o'sha binaryga ishlatilgan, o'zi qo'lda address topib yozishadi kodga 2ta binary ko'rsatmasdan, bu dangasa yo'li.
πŸ”₯4πŸ‘1
Tushimda yozgan exploitimga reverse shell kelibdi🏌️
Please open Telegram to view this post
VIEW IN TELEGRAM
😁12
Anchadan beri kutyotgandi ko'pchilik shuni

OST2 darslarini Offsecdagi OSEE darajasida chiqaradi tekinga,low level securityga qiziqadiganlar kirib ko'rishga arziydi.

P.S. Hozir kurs chiqmagan Beta testerlarga beryabdi
πŸ”₯4πŸ‘1
Forwarded from AUT Career Centre
πŸš€ Penetration Tester Intern
πŸ“ Location: Tashkent (onsite)
⏳ Work Schedule: Full-time


πŸ”Ή About Us:
Turan Security is a top cybersecurity company in Uzbekistan with proven expertise.

πŸ” Responsibilities:
πŸ›  Assist in manual & automated testing of web apps and systems.
πŸ“ Help draft reports on vulnerabilities.

βœ… Requirements:
πŸ”Ή Basic knowledge of network, API & web app pentesting.
πŸ”Ή Understanding of OWASP Top 10 & mitigation strategies.
πŸ”Ή Experience in any programming language.
πŸ”Ή Linux proficiency & strong networking/HTTP knowledge.

🌟 Preferred:

πŸ† CTF experience, πŸŽ“ security certifications (eJPT, CAPen, etc.), πŸ‘¨β€πŸ’» developer background, or bug bounty results.

πŸ’‘ Why TuranSec?
πŸ”₯ Real-world project experience.
πŸ‘₯ Work with experts.
πŸ’° Paid internship.

πŸ“©Send your CV to @turan_admin
πŸ”₯3πŸ‘1
Bularni olish katta narsa bizda

pwn.college ga kam kiryabman, motiv bo'lsin deb qo'ydim ohiri.

keyinroq tushuntirib beraman.
πŸ”₯3
AppSec Guy
Bularni olish katta narsa bizda pwn.college ga kam kiryabman, motiv bo'lsin deb qo'ydim ohiri. keyinroq tushuntirib beraman.
pwn.college kiber xavfsizlikni 0 dan pastga qarab o'rgatadi.

Nimaga tepagamas?)

Uyog'dagi darslar Low level securityga qaratilgan. Boshida boshqa mavzular bor lekin kernel exploitationgacha olib boradi ohirada baribir. Platformada hamma narsani Dojo deymiz, Dojo VNC, Dojo challenge, etc.

Rank oshgan xakerlarga belbog' beriladi karatedagi ranklarga o'xshab. Eng katta belbog'ni Blue belt deyishadi. Blue beltgacha borganlar OSEEga o'xshab kernel exploitationgacha yetib borgan bo'ladi, shunga Blue belt olish katta "Honor".

Yana platforma Arizona state universityga qarashli, hamma darslar tekin. Zo'r tomoni ichida HTBga o'xshab Pwnbox bor brauzer ichida sistema VNC bilan, VS codeniyam ochib berishgan tekinga brauzerdan.

Bu OST2 dan keyin aytiladigan eng zo'r platforma Binary exploitation o'rgangani tekinga.

Buni bizda hechkim eshitmagan adashmasam, kimdur Binary exploitationga kiraman desa shu postlar foyda berib qoladi biror kun. Rasmda sariq bilan ko'k belt turibdi, Ko'k belt rank olganlarga yetkizib berishadi. Menam birorkun post qo'yarman yetib keldi deb.
πŸ‘6πŸ”₯2😒1