Black Hat Go😉
مهارت های امنیتی_تهاجمی خودت رو افزایش بده.
این کتاب اول شما رو با فلسفه Go آشنا میکنه و نمونه های زیادی وجود داره که برای گسترش ابزار هاتون میتونید ازش استفاده کنید.
نمونه بارزش: پروتکل های رایج شبکه مثل:
DNS , HTTP , SMB.
یه عالمه تکنیک و مشکلاتی که پنتسترا باهاش مواجه شدن رو بررسی میکنید. ( سرقت دادهها، شناسایی بستهها و...)
حالا چیچی یاد میگیریم؟🤔😁
_ قرار دادن داده ها در تصویر گرافیکی شبکه قابل حمل یا (PNG*)
_نوشتن سرور DNS و پروکسی خودمون
_نوشتن ابزار های کارآمد
_ایجاد Fuzzer آسیب پذیر برای پیدا کردن نقطه ضعف های امنیتی یک برنامه
و.....
🎩 🎩
@Engineer_Computer
مهارت های امنیتی_تهاجمی خودت رو افزایش بده.
این کتاب اول شما رو با فلسفه Go آشنا میکنه و نمونه های زیادی وجود داره که برای گسترش ابزار هاتون میتونید ازش استفاده کنید.
نمونه بارزش: پروتکل های رایج شبکه مثل:
DNS , HTTP , SMB.
یه عالمه تکنیک و مشکلاتی که پنتسترا باهاش مواجه شدن رو بررسی میکنید. ( سرقت دادهها، شناسایی بستهها و...)
حالا چیچی یاد میگیریم؟🤔😁
_ قرار دادن داده ها در تصویر گرافیکی شبکه قابل حمل یا (PNG*)
_نوشتن سرور DNS و پروکسی خودمون
_نوشتن ابزار های کارآمد
_ایجاد Fuzzer آسیب پذیر برای پیدا کردن نقطه ضعف های امنیتی یک برنامه
و.....
🎩 🎩
@Engineer_Computer
The Art of Human Hacking.pdf
6.1 MB
این کتاب جنبه فنی بسیاری از مانورهای مهندسی اجتماعی رو آشکار و تشریح میکنه.
از برانگیختن، بهانهسازی، تأثیرگذاری و دستکاری و تمام جنبههای مهندسی اجتماعی با استفاده از نمونههای دنیای واقعی، تجربه شخصی و علم پشت آنها برای کشف رمز و راز در مهندسی اجتماعی،
جدا، بحث و توضیح داده .
@Engineer_Computer
از برانگیختن، بهانهسازی، تأثیرگذاری و دستکاری و تمام جنبههای مهندسی اجتماعی با استفاده از نمونههای دنیای واقعی، تجربه شخصی و علم پشت آنها برای کشف رمز و راز در مهندسی اجتماعی،
جدا، بحث و توضیح داده .
@Engineer_Computer
👍1
SOC Burnout tips and tricks.pdf
384.9 KB
آیا از کار تو soc خسته شدهاید؟ یه سری نکته و ترفند سوسکی جهت جلوگیری از نابودی مفرط!
قابل توجه مدیران SOC
@Engineer_Computer
قابل توجه مدیران SOC
@Engineer_Computer
🐞 What's security flaws with this PHP code? How to exploit and fix it?
نقص امنیتی این کد چیه؟ چطور exploit و fix میشه؟
Code: https://github.com/amir-h-fallahi/code_challenge/blob/main/0x02-PHP/PHP-Vulnerable-Code.php
#AppSec #code_challenge #vulnerable_code #web_security #PHP
@Engineer_Computer
نقص امنیتی این کد چیه؟ چطور exploit و fix میشه؟
Code: https://github.com/amir-h-fallahi/code_challenge/blob/main/0x02-PHP/PHP-Vulnerable-Code.php
#AppSec #code_challenge #vulnerable_code #web_security #PHP
@Engineer_Computer
tools
Blue Team Techniques
Ebpfguard - library for managing Linux security policies using eBPF
https://github.com/deepfence/ebpfguard
@Engineer_Computer
Blue Team Techniques
Ebpfguard - library for managing Linux security policies using eBPF
https://github.com/deepfence/ebpfguard
@Engineer_Computer
GitHub
GitHub - deepfence/ebpfguard: Rust library for writing Linux security policies using eBPF
Rust library for writing Linux security policies using eBPF - deepfence/ebpfguard
Sec code review
Bytesafe - security platform that protects organizations from open source software supply chain attacks
https://github.com/bitfront-se/bytesafe-ce
@Engineer_Computer
Bytesafe - security platform that protects organizations from open source software supply chain attacks
https://github.com/bitfront-se/bytesafe-ce
@Engineer_Computer
GitHub
GitHub - bitfront-se/bytesafe-ce: Bytesafe Community Edition is a security platform that protects organizations from open source…
Bytesafe Community Edition is a security platform that protects organizations from open source software supply chain attacks. - bitfront-se/bytesafe-ce
Malware analysis
1. Horabot Malware Botnet
https://blog.talosintelligence.com/new-horabot-targets-americas
2. Obfuscated Magecart Attack
https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains
@Engineer_Computer
1. Horabot Malware Botnet
https://blog.talosintelligence.com/new-horabot-targets-americas
2. Obfuscated Magecart Attack
https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains
@Engineer_Computer
Cisco Talos
New Horabot campaign targets the Americas
Cisco Talos has observed a threat actor deploying a previously unidentified botnet program Talos is calling “Horabot,” which delivers a known banking trojan and spam tool onto victim machines in a campaign that has been ongoing since at least November 2020.
RedTeam Tactics
1. Inside the Mind of a Cyber Attacker:
from Malware creation to Data Exfiltration
https://blog.hacktivesecurity.com/index.php/2023/06/05/inside-the-mind-of-a-cyber-attacker-from-malware-creation-to-data-exfiltration-part-1
2. Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
https://github.com/ZeroMemoryEx/Terminator
3. An old Windows workstations LPE for domain environments without LDAP signing/channel binding
https://github.com/BronzeBee/DavRelayUp
@Engineer_Computer
1. Inside the Mind of a Cyber Attacker:
from Malware creation to Data Exfiltration
https://blog.hacktivesecurity.com/index.php/2023/06/05/inside-the-mind-of-a-cyber-attacker-from-malware-creation-to-data-exfiltration-part-1
2. Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
https://github.com/ZeroMemoryEx/Terminator
3. An old Windows workstations LPE for domain environments without LDAP signing/channel binding
https://github.com/BronzeBee/DavRelayUp
@Engineer_Computer
Hacktivesecurity
Add title here
Hacktive Security - Advanced Cyber Security Services
tools
Blue Team Techniques
VMClarity - tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and security threats
https://github.com/openclarity/vmclarity
@Engineer_Computer
Blue Team Techniques
VMClarity - tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and security threats
https://github.com/openclarity/vmclarity
@Engineer_Computer
GitHub
GitHub - openclarity/vmclarity: VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of…
VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities - openclarity/vmclarity
Full Memory Crash Dumps vs. Raw Dumps: Which Is Best for Memory Analysis for Incident Response ? - Magnet Forensics
https://www.magnetforensics.com/blog/full-memory-crash-dumps-vs-raw-dumps-which-is-best-for-memory-analysis-for-incident-response/
@Engineer_Computer
https://www.magnetforensics.com/blog/full-memory-crash-dumps-vs-raw-dumps-which-is-best-for-memory-analysis-for-incident-response/
@Engineer_Computer
Magnet Forensics
Full Memory Crash Dumps vs. Raw Dumps: Which Is Best for Memory Analysis for Incident Response ? - Magnet Forensics
Matt Suiche talks full memory crash dumps vs. raw dumps how they measure up for memory analysis during incident response investigations.
simplejson_coderview.pdf
335.9 KB
Sec code review
Source Code Audit on simplejson for Open Source Technology Improvement Fund (OSTIF): Final Report and Management Summary 2023.
@Engineer_Computer
Source Code Audit on simplejson for Open Source Technology Improvement Fund (OSTIF): Final Report and Management Summary 2023.
@Engineer_Computer
Red Team Guide
Hi everyone! This guide is dedicated to all new and upcoming cybersecurity engineers who are seeking help and support. It's also for experienced engineers looking to sharpen their skills and for the Blue Team, who keep our environments safe from malicious actors. As someone who has faced the challenges of this field, I know how tough it can be to start from scratch and have no guidance on what to look for or how to understand a technique.
That's why I created this guide and as why I created Red Team Notes - to provide you with a roadmap for navigating the complex and ever-changing world of cybersecurity. I put a lot of effort and heart into creating this resource, using my own experiences and insights, as well as the knowledge and wisdom of others in the field. I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
https://www.buymeacoffee.com/dmcxblue
@Engineer_Computer
Hi everyone! This guide is dedicated to all new and upcoming cybersecurity engineers who are seeking help and support. It's also for experienced engineers looking to sharpen their skills and for the Blue Team, who keep our environments safe from malicious actors. As someone who has faced the challenges of this field, I know how tough it can be to start from scratch and have no guidance on what to look for or how to understand a technique.
That's why I created this guide and as why I created Red Team Notes - to provide you with a roadmap for navigating the complex and ever-changing world of cybersecurity. I put a lot of effort and heart into creating this resource, using my own experiences and insights, as well as the knowledge and wisdom of others in the field. I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
https://www.buymeacoffee.com/dmcxblue
@Engineer_Computer
Buy Me a Coffee
dmcxblue is Red Team Content
Just a guy trying to Red Team
Sec_as_code.pdf
3.1 MB
Techbook
CloudSecurity
Security as Code:
DevSecOps Patterns with AWS 2023.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1402.03.20
@Engineer_Computer
CloudSecurity
Security as Code:
DevSecOps Patterns with AWS 2023.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1402.03.20
@Engineer_Computer
AIBugHunter.pdf
2.5 MB
tools
Research
"AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities", 2023
https://github.com/awsm-research/aibughunter
@Engineer_Computer
Research
"AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities", 2023
https://github.com/awsm-research/aibughunter
@Engineer_Computer
tools
Red Team Tactics
1. Abusing ADSI for password retrieval
https://www.tarlogic.com/blog/linked-servers-adsi-passwords
2. XAttacker Tool PRO V30 Website Vulnerability Scanner & Auto Exploiter
https://github.com/Moham3dRiahi/XAttackProV30
@Engineer_Computer
Red Team Tactics
1. Abusing ADSI for password retrieval
https://www.tarlogic.com/blog/linked-servers-adsi-passwords
2. XAttacker Tool PRO V30 Website Vulnerability Scanner & Auto Exploiter
https://github.com/Moham3dRiahi/XAttackProV30
@Engineer_Computer
Tarlogic Security
MSSQL linked servers: abusing ADSI for password retrieval
New technique to gather passwords from MSSQL by abusing linked servers through the ADSI provider
info
Common Vulnerability Scoring System (CVSS) version 4.0
]-> Guide: https://www.first.org/cvss/v4.0/user-guide
]-> Calculator: https://www.first.org/cvss/calculator/4.0
]-> Specification: https://www.first.org/cvss/v4.0/specification-document
@Engineer_Computer
Common Vulnerability Scoring System (CVSS) version 4.0
]-> Guide: https://www.first.org/cvss/v4.0/user-guide
]-> Calculator: https://www.first.org/cvss/calculator/4.0
]-> Specification: https://www.first.org/cvss/v4.0/specification-document
@Engineer_Computer
FIRST — Forum of Incident Response and Security Teams
CVSS v4.0 User Guide
Cyber risk is calculated by considering the identified security threat, its degree of vulnerability, and the likelihood of exploitation. At a high level, this can be quantified as follows:
Cyber risk = Threat x Vulnerability x Information Value
In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
How to Measure Anything in Cybersecurity Risk
Second Edition
DOUGLAS W. HUBBARD
RICHARD SEIERSEN
Logo: Wiley
Copyright © 2023 by John Wiley & Sons, Inc. All rights reserved.
https://lnkd.in/euz7HM8Y
-Business Secure Continuity-
1402.03.21
#cybersecurity #job #training #help #university #future #security #business #sansinstitute #eccouncil #iso22301 #nistcybersecurityframework #isaca #cissp
#isc2 #redteam #blueteam #csirt #forensics #splunksecurity #siem #otsecurity
@Engineer_Computer
Cyber risk = Threat x Vulnerability x Information Value
In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
How to Measure Anything in Cybersecurity Risk
Second Edition
DOUGLAS W. HUBBARD
RICHARD SEIERSEN
Logo: Wiley
Copyright © 2023 by John Wiley & Sons, Inc. All rights reserved.
https://lnkd.in/euz7HM8Y
-Business Secure Continuity-
1402.03.21
#cybersecurity #job #training #help #university #future #security #business #sansinstitute #eccouncil #iso22301 #nistcybersecurityframework #isaca #cissp
#isc2 #redteam #blueteam #csirt #forensics #splunksecurity #siem #otsecurity
@Engineer_Computer
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
Researchers have uncovered a new flaw (CVE-2023-28299) in the Microsoft Visual Studio installer that could allow attackers to impersonate trusted publishers and distribute malicious extensions.
Read details:
https://thehackernews.com/2023/06/researchers-uncover-publisher-spoofing.html
@Engineer_Computer
Read details:
https://thehackernews.com/2023/06/researchers-uncover-publisher-spoofing.html
@Engineer_Computer
⚠️ Urgent: A new critical RCE security #vulnerability (CVE-2023-27997) in FortiGate firewalls has been discovered. Update to the latest versions to secure your network against potential remote code execution.
Read details:
https://thehackernews.com/2023/06/critical-rce-flaw-discovered-in.html…
#infosec #cybersecurity
@Engineer_Computer
Read details:
https://thehackernews.com/2023/06/critical-rce-flaw-discovered-in.html…
#infosec #cybersecurity
@Engineer_Computer
Hackers are actively exploiting the latest Fortinet's FortiOS and FortiProxy flaw, targeting government, manufacturing, and critical infrastructure sectors.
Learn more:
https://thehackernews.com/2023/06/critical-fortios-and-fortiproxy.html
Take immediate action and update to the latest firmware now!
@Engineer_Computer
Learn more:
https://thehackernews.com/2023/06/critical-fortios-and-fortiproxy.html
Take immediate action and update to the latest firmware now!
@Engineer_Computer