Network Security Channel
2.57K subscribers
5.33K photos
3.42K videos
5.56K files
4.44K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
کشف دوربین های جاسازی شده در محل هایی چون هتل ها با گوشی های اندرویید و آیفون

با استفاده از پی جویی شبکه وای فای و قابلیت دید در شب
@Engineer_Computer

https://hakin9.org/detect-hidden-surveillance-cameras-with-your-phone-by-anastasis-vasileiadis/#login
CVE-2023-29489 : Finding XSS in a million websites (cPanel -Reflected Cross-Site Scripting)
POC : https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/
Link : https://blog.assetnote.io/2023/04/26/cpanel-xss-advisory/

@Engineer_Computer
Alarming news for industrial control systems: 34% of reported vulnerabilities have no patch or remediation, up from last year's 13%.

Read: https://thehackernews.com/2023/08/industrial-control-systems.html

SynSaber data shows that CISA received reports of 670 ICS product flaws in H1 2023. Among them, 88 were critical and 227 had no available fixes.

@Engineer_Computer
⭕️Analytics
A Year in Review of 0-days Exploited In-the-Wild in 2022
Maddie Stone, Security Researcher, Threat Analysis Group (TAG)

This is Google’s fourth annual year-in-review of 0-days exploited in-the-wild [2021, 2020, 2019] and builds off of the mid-year 2022 review. The goal of this report is not to detail each individual exploit, but instead to analyze the exploits from the year as a whole, looking for trends, gaps, lessons learned, and successes.
Executive Summary
41 in-the-wild 0-days were detected and disclosed in 2022, the second-most ever recorded since we began tracking in mid-2014, but down from the 69 detected in 2021. Although a 40% drop might seem like a clear-cut win for improving security, the reality is more complicated. Some of our key takeaways from 2022 include:

N-days function like 0-days on Android due to long patching times. Across the Android ecosystem there were multiple cases where patches were not available to users for a significant time. Attackers didn’t need 0-day exploits and instead were able to use n-days that functioned as 0-days.

0-click exploits and new browser mitigations drive down browser 0-days. Many attackers have been moving towards 0-click rather than 1-click exploits. 0-clicks usually target components other than the browser. In addition, all major browsers also implemented new defenses that make exploiting a vulnerability more difficult and could have influenced attackers moving to other attack surfaces.

Over 40% of the 0-days discovered were variants of previously reported vulnerabilities. 17 out of the 41 in-the-wild 0-days from 2022 are variants of previously reported vulnerabilities. This continues the unpleasant trend that we’ve discussed previously in both the 2020 Year in Review report and the mid-way through 2022 report. More than 20% are variants of previous in-the-wild 0-days from 2021 and 2020.

Bug collisions are high. 2022 brought more frequent reports of attackers using the same vulnerabilities as each other, as well as security researchers reporting vulnerabilities that were later discovered to be used by attackers. When an in-the-wild 0-day targeting a popular consumer platform is found and fixed, it's increasingly likely to be breaking another attacker's exploit as well

https://security.googleblog.com/2023/07/the-ups-and-downs-of-0-days-year-in.html

@Engineer_Computer

#vulnerability #zerotrust #zeroday #threatintelligence #threathunting
REPORT ON ISMS AUDITS.pdf
1.4 MB
گزارش های ممیزی ISMS را چطور بنویسیم
@Engineer_Computer
شغل شما بعنوان تستر نفوذ فیزیکی این است هرچه بیشتر آسیب پذیری در لایه فیزیکال پیدا کنید

حالا از یک زاویه دیگر این موضوع رو بررسی می‌کنیم: انجام عملیات در روز یا شب
پارامتر های موثر

@Engineer_Computer

https://covertaccessteam.substack.com/p/day-vs-night
pdb_framework_implementation.pdf
247.4 KB
طراحی سیستم ها با رعایت مساله حریم خصوصی
@Engineer_Computer
HTTP in Detail.pdf
1.1 MB
یکبار برای همیشه HTTP را قورت دهید
@Engineer_Computer
⭕️ موسسه HRF تعداد ۲۰ بیتکوین برای چندین پروژه‌ بانتی قرار داده که علاقه‌مندان از هرجای دنیا میتونن این پروژه‌های اوپن سورس رو انجام بدن و بانتی رو بدست بیارن.
به عنوان نمونه یکی از پروژه‌ها ساخت نرم افزار موبایل غیرحضانتی برای آدرس‌های لایتنینگیه و ۲ بیتکوین بانتی‌ براش تخصیص داده شده.
یکی دیگه از بانتی ها توسعه‌ی روشی برای انجام payjoin بدون نیاز به سرور هم ۲ بیتکوین بانتی داره.
پورت کردن کیت توسعه UI بیتکوین از فیگما به پروژه‌ی اوپن سورس Penpot هم ۲ بیتکوین بانتی داره
لیست بانتی‌ها رو میتونید از بیتکوین مگزین مطالعه کنید:

https://bitcoinmagazine.com/business/human-rights-foundation-announces-20-btc-bounty-challenge-for-bitcoin-development
#bounty #develop

@Engineer_Computer
سویچ هایی مرکزی تبادل ترافیک کشور دچار اختلالاتی هستند!

هنوز منابع و افراد در وزارت ارتباطات خبری منتشر نکرده اند.
@Engineer_Computer
🔒 Urgent Alert: Hundreds of Citrix NetScaler ADC and Gateway servers breached! Malicious actors exploit CVE-2023-3519 #vulnerability to deploy web shells.

Read more about this threat: https://thehackernews.com/2023/08/hundreds-of-citrix-netscaler-adc-and.html

@Engineer_Computer