InfoSecTube
1.71K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
#interview #Cybersecurity

🔶Google Chrome V8 Memory Corruption Vulnerability

Google’s Chrome browser has several security vulnerabilities that could pave the way to multiple types of attacks, including a V8 bug that could allow remote code execution (RCE) within a user’s browser.

The high-severity V8 issue is tracked as CVE-2021-21227, and was reported by Gengming Liu from Singular Security Lab. Google describes the bug as “insufficient data validation in V8” but is keeping other details close to its vest.

However, Liu told SecurityWeek that the bug is somewhat mitigated by the fact that it doesn’t allow attackers to escape the sandbox where Chrome runs, meaning attackers can’t reach any of the other program, data and applications on the computer. Thus, CVE-2021-21227 would need to be chained with another vulnerability in order to successfully wreak havoc on a target’s machine beyond the browser itself.

The researcher that his discovery is related to prior, now-patched V8 vulnerabilities ( CVE-2020-16040 and CVE-2020-15965). The first allows a remote attacker to exploit heap corruption if a user visits, or is redirected to, a specially crafted web page. The latter is a type-confusion bug that allows a remote attacker to potentially perform out of bounds memory access, also exploitable with a specially crafted HTML page.

Meanwhile, according to another report , the implications of an attack using the bug depends on the privileges associated with the application: In the worst-case scenario, an attacker could view, change or delete data.

And, if someone has turned off sandboxing, all bets are off.

Google recently patched a zero-day in Chrome (link). That was another V8 issue that allowed RCE inside the browser app (but not sandbox escape).

An important mindset derives from this bug is that "Many V8 vulnerabilities exploited by real-world attackers are effectively 2nd order vulnerabilities: the root-cause is often a logic issue in one of the JIT compilers, which can then be exploited to generate vulnerable machine code (e.g. code that is missing a runtime safety check). The generated code can then in turn be exploited to cause memory corruption at runtime." Therefore, all vulnerabilities have their own importance in a real-world attack scenario.

Reference link

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube

Successful exploitation may allow execution of arbitrary code.
#interview #Cybersecurity

🔶What is heap based overflow?

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().


heap overflow happens when a chunk of memory is allocated to the heap and data is written to this memory without any bound checking being done on the data.

🔘Simple Example
🔘
Types of Heap overflow

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3
Realtime Number Plate Detection using Yolov7 – Easiest Explanation

✳️ YOLOv7 is the new state-of-the-art real-time object detection model. In this blog, we will see the step-by-step guide to Train YOLOv7 on custom dataset.

Blog

✳️ Dataset_1
✳️ Dataset_2

🔉
@infosectube
📌youtube channel
☣️instagram pageا
🚀OSV-Scanner

🪝Use OSV-Scanner to find existing vulnerabilities affecting your project's dependencies.

🚧OSV-Scanner provides an officially supported frontend to the OSV database that connects a project’s list of dependencies with the vulnerabilities that affect them.

Link

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
😈h4PpY NEw ye4r 2023 ❤️🎉
🔥4👍1
OSI Model Part 2
Link
🚀OSV-Scanner

🪝Use OSV-Scanner to find existing vulnerabilities affecting your project's dependencies.

🚧OSV-Scanner provides an officially supported frontend to the OSV database that connects a project’s list of dependencies with the vulnerabilities that affect them.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
عملکرد کانال InfoSecTube در سال 2022 را چگونه ارزیابی کرده اید؟
Final Results
43%
خوب
38%
متوسط
19%
ضعیف
🖥 سری ویدیو های آموزشی Node.Js
👨‍💻مدرس : میثم منصف

🔹آشنایی مقدماتی با nodejs
https://youtu.be/Vjb6l8xNRAQ
🔹آشنایی با معماری نود جی اس(Node.js)
https://youtu.be/guOhZ20ZGwg
🔹نصب محیط برنامه نویسی نود جی اس
https://youtu.be/6n3ebW3z0rc
🔹نصب نود جی اس روی لینوکس
https://youtu.be/f_fgncga6qQ
🔹راه اندازی phpstorm و Nodemon
https://youtu.be/Fb6t4GeYbHM
🔹متغییر ها در نود جی اس
https://youtu.be/-XxYjeFCRqA
🔹توابع در نود جی اس
https://youtu.be/0yRI2rcAMdc
🔹تعیین سطح دسترسی و محدوده در نود جی اس
https://youtu.be/Xy1P58RXWKY
🔹آشنایی با لاگ در نود جی اس
https://youtu.be/xo4IFyoLs4U
🔹آشنایی با Async در نود جی اس
https://youtu.be/-697ez4e6vw

🔝 @InfoSecTube
🖥 🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #cybersecurity

🔶What is RFC?

A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #cybersecurity #Terminology

Node: A device that implement IPV6
Router: A node that forwards IPV6 packets not explicitly addressed to itself.
Host: Any node that is not a router

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube