🔻 Understanding Threat Hunting and Its Integration with the MITRE ATT&CK Framework
=========================
#redteam #mitre #threat #hunting
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
=========================
#redteam #mitre #threat #hunting
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Medium
Understanding Threat Hunting and Its Integration with the MITRE ATT&CK Framework
In an ever-evolving cyber threat landscape, organizations must proactively detect and mitigate threats. Threat hunting plays a crucial role…
🔰Q1:
Explain the role of DHCP, DNS, TCP/IP, and OSI in Windows networking.
Answer: DHCP is responsible for IP address allocation, DNS for name resolution, TCP/IP for communication, and OSI serves as a conceptual model.
=========================
#Interview #RedTeam #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Explain the role of DHCP, DNS, TCP/IP, and OSI in Windows networking.
Answer:
=========================
#Interview #RedTeam #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
🔰Q2:
What are some common methods used for gaining initial access to a target network?
Answer:Common methods include:
Phishing attacks
Exploiting software vulnerabilities (e.g., remote code execution)
Brute-force attacks on authentication mechanisms
Social engineering tactics
=========================
#Interview #RedTeam #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
What are some common methods used for gaining initial access to a target network?
Answer:
Phishing attacks
Exploiting software vulnerabilities (e.g., remote code execution)
Brute-force attacks on authentication mechanisms
Social engineering tactics
=========================
#Interview #RedTeam #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
🎁Guide to OWASP Smart Contract Top 10 Vulnerabilities
=========================
#owasp #smartcontract #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
=========================
#owasp #smartcontract #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Medium
Guide to OWASP Smart Contract Top 10 Vulnerabilities
Owasp top 10 for smart contract easy understanding approach
👍1
🎁The Great Rate Limit Escape: An X-Forwarded-For Exploit Story
Note:
If you enjoyed this story, please subscribe to my Medium and YouTube channel.
Don’t forget to like and leave comments to motivate me to keep creating more content!
=========================
#owasp #webhacking #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Note:
If you enjoyed this story, please subscribe to my Medium and YouTube channel.
Don’t forget to like and leave comments to motivate me to keep creating more content!
=========================
#owasp #webhacking #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Medium
The Great Rate Limit Escape: An X-Forwarded-For Exploit Story
In the world of web security, sometimes the smallest details can lead to the biggest vulnerabilities. This is a story about how a simple…
❤1
Recovery Point Objective (RPO)
"هدف نقطه بازیابی" یا Recovery Point Objective (RPO) به زمانی اشاره دارد که دادههای یک سیستم میتوانند به طور مطلوب و تا چه میزان، پس از یک حادثه یا فاجعه، بازیابی شوند. RPO یکی دیگر از معیارهای مهم در بحرانهای فناوری اطلاعات و مدیریت ریسک است.
ساختارهای مختلفی برای تعیین RPO وجود دارد که عبارتند از:
1. نیازهای تجاری: این رویکرد بر اساس نیازهای و توقعات تجاری سازمان تعیین میشود. برای مثال، یک سازمان ممکن است به دنبال بازیابی دادهها به حالتی باشد که اخرین تغییرات دادهها تا زمان مشخصی (مثلاً ۳ ساعت قبل از حادثه) حفظ شده باشند.
2. فناوری موجود: RPO ممکن است بر اساس تکنولوژیها و راهکارهای موجود برای پشتیبانگیری از داده تعیین شود. مثال: استفاده از فناوریهای پشتیبانگیری مانند نسخهبرداری مستقیم (continuous data protection) میتواند باعث شود که RPO به حداقل برسد.
3. ارزیابی ریسک: تعیین RPO ممکن است بر اساس ارزیابی ریسک و اهمیت دادهها صورت گیرد. برای مثال، برای دادههایی که از نظر اقتصادی یا عملیاتی بسیار حائز اهمیت هستند، RPO ممکن است بسیار کمتر از دادههای کم اهمیتتر باشد.
در نتیجه، تعیین RPO براساس نیازهای تجاری، فناوریهای موجود و ارزیابی ریسک، به سازمانها کمک میکند تا استراتژی مناسب برای پشتیبانگیری از دادهها را تعیین کرده و به این ترتیب، در صورت وقوع حادثه، بتوانند دادههای مهم خود را به حداقل از دست دادند.
=========================
#Recovery_Point_Objective #RPO #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
"هدف نقطه بازیابی" یا Recovery Point Objective (RPO) به زمانی اشاره دارد که دادههای یک سیستم میتوانند به طور مطلوب و تا چه میزان، پس از یک حادثه یا فاجعه، بازیابی شوند. RPO یکی دیگر از معیارهای مهم در بحرانهای فناوری اطلاعات و مدیریت ریسک است.
ساختارهای مختلفی برای تعیین RPO وجود دارد که عبارتند از:
1. نیازهای تجاری: این رویکرد بر اساس نیازهای و توقعات تجاری سازمان تعیین میشود. برای مثال، یک سازمان ممکن است به دنبال بازیابی دادهها به حالتی باشد که اخرین تغییرات دادهها تا زمان مشخصی (مثلاً ۳ ساعت قبل از حادثه) حفظ شده باشند.
2. فناوری موجود: RPO ممکن است بر اساس تکنولوژیها و راهکارهای موجود برای پشتیبانگیری از داده تعیین شود. مثال: استفاده از فناوریهای پشتیبانگیری مانند نسخهبرداری مستقیم (continuous data protection) میتواند باعث شود که RPO به حداقل برسد.
3. ارزیابی ریسک: تعیین RPO ممکن است بر اساس ارزیابی ریسک و اهمیت دادهها صورت گیرد. برای مثال، برای دادههایی که از نظر اقتصادی یا عملیاتی بسیار حائز اهمیت هستند، RPO ممکن است بسیار کمتر از دادههای کم اهمیتتر باشد.
در نتیجه، تعیین RPO براساس نیازهای تجاری، فناوریهای موجود و ارزیابی ریسک، به سازمانها کمک میکند تا استراتژی مناسب برای پشتیبانگیری از دادهها را تعیین کرده و به این ترتیب، در صورت وقوع حادثه، بتوانند دادههای مهم خود را به حداقل از دست دادند.
=========================
#Recovery_Point_Objective #RPO #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Telegram
InfoSecTube
از این کانال حمایت کنید تا بتواند به قابلیتهای اضافی دسترسی پیدا کند.
❤2
Israel Ministry of Justice.torrent
578.3 KB
NEW: Israel Ministry of Justice (245 GB)
https://ddosecrets.com/article/israel-ministry-of-justice
Download: https://data.ddosecrets.com/Israel%20Ministry%20of%20Justice/
magnet:?xt=urn:btih:A94997457756E6847E19E055122AE303A5026200
=========================
#Database #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
https://ddosecrets.com/article/israel-ministry-of-justice
Download: https://data.ddosecrets.com/Israel%20Ministry%20of%20Justice/
magnet:?xt=urn:btih:A94997457756E6847E19E055122AE303A5026200
=========================
#Database #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
👍1
🔰My Last blog post:
🧊Unleashing the Power of eBPF: A Comprehensive Guide to Linux Kernel Observability and Security
🥃The Great Rate Limit Escape: An X-Forwarded-For Exploit Story
🎯Building and Reversing a Simple Rust Binary: A Step-by-Step Guide
⚓️Understanding Threat Hunting and Its Integration with the MITRE ATT&CK Framework
📯OWASP Top 10 for Large Language Models (LLMs) with Examples
🔔Android Packers 101: Unveiling the Mechanics of Loading and Running Code at Runtime
🔶Guide to OWASP Smart Contract Top 10 Vulnerabilities
=========================
#Medium #infosectube #undercover
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
🧊Unleashing the Power of eBPF: A Comprehensive Guide to Linux Kernel Observability and Security
🥃The Great Rate Limit Escape: An X-Forwarded-For Exploit Story
🎯Building and Reversing a Simple Rust Binary: A Step-by-Step Guide
⚓️Understanding Threat Hunting and Its Integration with the MITRE ATT&CK Framework
📯OWASP Top 10 for Large Language Models (LLMs) with Examples
🔔Android Packers 101: Unveiling the Mechanics of Loading and Running Code at Runtime
🔶Guide to OWASP Smart Contract Top 10 Vulnerabilities
=========================
#Medium #infosectube #undercover
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Medium
Unleashing the Power of eBPF: A Comprehensive Guide to Linux Kernel Observability and Security
Introduction
❤1👍1
What is HTTP/1.1?
The first usable version of HTTP was created in 1997. Because it went through several stages of development, this first version of HTTP was called HTTP/1.1. This version is still in use on the web.
What is HTTP/2?
In 2015, a new version of HTTP called HTTP/2 was created. HTTP/2 solves several problems that the creators of HTTP/1.1 did not anticipate. In particular, HTTP/2 is much faster and more efficient than HTTP/1.1. One of the ways in which HTTP/2 is faster is in how it prioritizes content during the loading process.
What is HTTP/3?
HTTP/3 is the next proposed version of the HTTP protocol. HTTP/3 does not have wide adoption on the web yet, but it is growing in usage. The key difference between HTTP/3 and previous versions of the protocol is that HTTP/3 runs over QUIC instead of TCP. QUIC is a faster and more secure transport layer protocol that is designed for the needs of the modern Internet.
#http #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
The first usable version of HTTP was created in 1997. Because it went through several stages of development, this first version of HTTP was called HTTP/1.1. This version is still in use on the web.
What is HTTP/2?
In 2015, a new version of HTTP called HTTP/2 was created. HTTP/2 solves several problems that the creators of HTTP/1.1 did not anticipate. In particular, HTTP/2 is much faster and more efficient than HTTP/1.1. One of the ways in which HTTP/2 is faster is in how it prioritizes content during the loading process.
What is HTTP/3?
HTTP/3 is the next proposed version of the HTTP protocol. HTTP/3 does not have wide adoption on the web yet, but it is growing in usage. The key difference between HTTP/3 and previous versions of the protocol is that HTTP/3 runs over QUIC instead of TCP. QUIC is a faster and more secure transport layer protocol that is designed for the needs of the modern Internet.
#http #infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
🔻My Last Blog post on Hadess!
Practical LLM Attack Scenarios
#LLM #Infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Practical LLM Attack Scenarios
#LLM #Infosectube
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
YouTube
InfoSecTube
Unlock the Power of Ethical Hacking: Learn by Hacking
🔒 Looking to master the art of ethical hacking? Welcome to a channel designed to quench your thirst for diving deep into pen-testing without the inevitable headache. With casually explained walk-throughs…
🔒 Looking to master the art of ethical hacking? Welcome to a channel designed to quench your thirst for diving deep into pen-testing without the inevitable headache. With casually explained walk-throughs…
👍3❤1
💮A Machine Learning approach for DDoS detection on IoT devices
Abstract:
In the current world, the Internet is being used almost everywhere. With the rise of IoT technology, which is one of the most used technologies, billions of IoT devices are interconnected over the Internet. However, DoS/DDoS attacks are the most frequent and perilous threat to this growing technology. New types of DDoS attacks are highly advanced and complicated, and it is almost impossible to detect or mitigate by the existing intrusion detection systems and traditional methods. Fortunately, Big Data, Data mining, and Machine Learning technologies make it possible to detect DDoS traffic effectively. This paper suggests a DDoS detection model based on data mining and machine learning techniques. For writing this paper, the latest available Dataset, CICDDoS2019, experimented with the most popular machine learning algorithms and specified the most correlated features with predicted classes are being used. It is discovered that AdaBoost and XGBoost were extraordinarily accurate and correctly predicted the type of network traffic with 100% accuracy. Future research can be extended by enhancing the model for multiclassification of different DDoS attack types and testing hybrid algorithms and newer datasets on this model.
Link
#Arxiv #Infosectube #ML
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Abstract:
In the current world, the Internet is being used almost everywhere. With the rise of IoT technology, which is one of the most used technologies, billions of IoT devices are interconnected over the Internet. However, DoS/DDoS attacks are the most frequent and perilous threat to this growing technology. New types of DDoS attacks are highly advanced and complicated, and it is almost impossible to detect or mitigate by the existing intrusion detection systems and traditional methods. Fortunately, Big Data, Data mining, and Machine Learning technologies make it possible to detect DDoS traffic effectively. This paper suggests a DDoS detection model based on data mining and machine learning techniques. For writing this paper, the latest available Dataset, CICDDoS2019, experimented with the most popular machine learning algorithms and specified the most correlated features with predicted classes are being used. It is discovered that AdaBoost and XGBoost were extraordinarily accurate and correctly predicted the type of network traffic with 100% accuracy. Future research can be extended by enhancing the model for multiclassification of different DDoS attack types and testing hybrid algorithms and newer datasets on this model.
Link
#Arxiv #Infosectube #ML
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
arXiv.org
A Machine Learning Approach for DDoS Detection on IoT Devices
In the current world, the Internet is being used almost everywhere. With the rise of IoT technology, which is one of the most used technologies, billions of IoT devices are interconnected over the...
💮Enabling a zero trust architecture in a 5G-enabled smart grid
Abstract:
One of the most promising applications of the IoT is the Smart Grid (SG). Integrating SG's data communications network into the power grid allows for gathering and analyzing information from power lines, distribution power stations, and end users. A smart grid (SG) requires a fast and dependable connection to provide real-time monitoring through the IoT. Hence 5G could be considered a catalyst for upgrading the existing power grid systems. Nonetheless, the additional attack surface of information infrastructure has been brought about by the widespread adoption of ubiquitous connectivity in 5G, to which the typical information security system in the smart grid cannot respond promptly. Therefore, guaranteeing the Privacy and Security of a network in a threatening, ever-changing environment requires groundbreaking architectures that go well beyond the limitations of traditional, static security measures. With" Continuous Identity Authentication and Dynamic Access Control" as its foundation, this article analyzes the Zero Trust (ZT) architecture specific to the power system of IoT and uses that knowledge to develop a security protection architecture.
Link
#Arxiv #Infosectube #ZT
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Abstract:
One of the most promising applications of the IoT is the Smart Grid (SG). Integrating SG's data communications network into the power grid allows for gathering and analyzing information from power lines, distribution power stations, and end users. A smart grid (SG) requires a fast and dependable connection to provide real-time monitoring through the IoT. Hence 5G could be considered a catalyst for upgrading the existing power grid systems. Nonetheless, the additional attack surface of information infrastructure has been brought about by the widespread adoption of ubiquitous connectivity in 5G, to which the typical information security system in the smart grid cannot respond promptly. Therefore, guaranteeing the Privacy and Security of a network in a threatening, ever-changing environment requires groundbreaking architectures that go well beyond the limitations of traditional, static security measures. With" Continuous Identity Authentication and Dynamic Access Control" as its foundation, this article analyzes the Zero Trust (ZT) architecture specific to the power system of IoT and uses that knowledge to develop a security protection architecture.
Link
#Arxiv #Infosectube #ZT
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
💮UltraLearn: next-generation cybersecurity learning platform
Abstract:
Learning was always an essential part of our lives to acquire knowledge and move forward. However, the increasing wages of on-campus learning leads to an increasing need for an alternate way of learning. With the outbreak of COVID-19, people needed to stay at home for safety. Therefore, finding an answer to this need became more dominant. Another major problem, especially in the ongoing decade, is the lack of enough cybersecurity knowledge by the common folk. This paper aims to look at a new platform that is carefully designed to teach cybersecurity to learners with any background. We design this system using gamification to increase the efficiency of learning. Because modern technologies are ubiquitous in our lives, particularly during the coronavirus outbreak, including practical work in teaching will be quite beneficial. The practical activity has a clear advantage, such as promoting experimental …
Link
#Arxiv #Infosectube #ZT
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Abstract:
Learning was always an essential part of our lives to acquire knowledge and move forward. However, the increasing wages of on-campus learning leads to an increasing need for an alternate way of learning. With the outbreak of COVID-19, people needed to stay at home for safety. Therefore, finding an answer to this need became more dominant. Another major problem, especially in the ongoing decade, is the lack of enough cybersecurity knowledge by the common folk. This paper aims to look at a new platform that is carefully designed to teach cybersecurity to learners with any background. We design this system using gamification to increase the efficiency of learning. Because modern technologies are ubiquitous in our lives, particularly during the coronavirus outbreak, including practical work in teaching will be quite beneficial. The practical activity has a clear advantage, such as promoting experimental …
Link
#Arxiv #Infosectube #ZT
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
💮Zero Trust: Applications, Challenges, and Opportunities
Abstract:
The escalating complexity of cybersecurity threats necessitates innovative approaches to safeguard digital assets and sensitive information. The Zero Trust paradigm offers a transformative solution by challenging conventional security models and emphasizing continuous verification and least privilege access. This survey comprehensively explores the theoretical foundations, practical implementations, applications, challenges, and future trends of Zero Trust. Through meticulous analysis, we highlight the relevance of Zero Trust in securing cloud environments, facilitating remote work, and protecting the Internet of Things (IoT) ecosystem. While cultural barriers and technical complexities present challenges, their mitigation unlocks Zero Trust's potential. Integrating Zero Trust with emerging technologies like AI and machine learning augments its efficacy, promising a dynamic and responsive security landscape. Embracing Zero Trust empowers organizations to navigate the ever-evolving cybersecurity realm with resilience and adaptability, redefining trust in the digital age.
Link
#Arxiv #Infosectube #ZT
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Abstract:
The escalating complexity of cybersecurity threats necessitates innovative approaches to safeguard digital assets and sensitive information. The Zero Trust paradigm offers a transformative solution by challenging conventional security models and emphasizing continuous verification and least privilege access. This survey comprehensively explores the theoretical foundations, practical implementations, applications, challenges, and future trends of Zero Trust. Through meticulous analysis, we highlight the relevance of Zero Trust in securing cloud environments, facilitating remote work, and protecting the Internet of Things (IoT) ecosystem. While cultural barriers and technical complexities present challenges, their mitigation unlocks Zero Trust's potential. Integrating Zero Trust with emerging technologies like AI and machine learning augments its efficacy, promising a dynamic and responsive security landscape. Embracing Zero Trust empowers organizations to navigate the ever-evolving cybersecurity realm with resilience and adaptability, redefining trust in the digital age.
Link
#Arxiv #Infosectube #ZT
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
arXiv.org
Zero Trust: Applications, Challenges, and Opportunities
The escalating complexity of cybersecurity threats necessitates innovative approaches to safeguard digital assets and sensitive information. The Zero Trust paradigm offers a transformative...
👎1
💮IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
Abstract:
The widespread deployment of sensors and linked items contributes to the rising interest in the Internet-of-Things (IoT). These are used in conjunction with other Online services to develop highly sophisticated and profitable cloud-based services. Despite significant attempts to secure them, security management remains a crucial problem for these devices, Because of their intricacy, heterogeneous nature, and resource constraints. This paper presents IoT-Shield, a data mining technique that coincides with a process mining approach for identifying misbehavior in of the kind. IoT-Shield enables the characterization of IoT devices' behavioral models and the detection of possible threats, even in the presence of diverse protocols and platforms. The underlying architecture and components are then described and formalized, and a proof-of-concept prototype is detailed. A real-world traffic dataset known as KDD-NSL is …
Link
#Arxiv #Infosectube #ZT
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Abstract:
The widespread deployment of sensors and linked items contributes to the rising interest in the Internet-of-Things (IoT). These are used in conjunction with other Online services to develop highly sophisticated and profitable cloud-based services. Despite significant attempts to secure them, security management remains a crucial problem for these devices, Because of their intricacy, heterogeneous nature, and resource constraints. This paper presents IoT-Shield, a data mining technique that coincides with a process mining approach for identifying misbehavior in of the kind. IoT-Shield enables the characterization of IoT devices' behavioral models and the detection of possible threats, even in the presence of diverse protocols and platforms. The underlying architecture and components are then described and formalized, and a proof-of-concept prototype is detailed. A real-world traffic dataset known as KDD-NSL is …
Link
#Arxiv #Infosectube #ZT
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
ieeexplore.ieee.org
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
The widespread deployment of sensors and linked items contributes to the rising interest in the Internet-of-Things (IoT). These are used in conjunction with other Online services to develop highly sophisticated and profitable cloud-based services. Despite…
❌مصاحبه تست نفوذ وب❌
1. تست نفوذ وب چیست و طی تست اهداف اصلی کدام موارد هستند؟
تست نفوذ وب یک فرآیند ارزیابی حملات شناخته شده روی وب جهت ارزیابی و شناسایی حملات و بررسی شرایط بعد از اکسپلویت و نتایج کلی در قالب یک گزارش تست نفوذ می باشد.
2. تفاوت بین روش تست جعبه سیاه، جعبه خاکستری و جعبه سفید را تست نفوذ وب چیست؟
بلک باکس blackbox یا جعبه سیاه نوعی از تست نفوذ می باشد که هیچ اطلاعاتی در مورد هدف وجود ندارد
گری باکس gray box یا جعبه خاکستری گاهی اوقات پیش می آید یک سری اطلاعات اولیه مثل یوزر و پسورد پنل یا بایپس کردن waf را برای شما تسهیل می کنند.
وایت باکس یا whitebox یا جعبه سفید نوع ارزیابی که شما به کدهای دسترسی دارید و می توانید آسیب پذیری را از کد پیدا کنید.
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
1. تست نفوذ وب چیست و طی تست اهداف اصلی کدام موارد هستند؟
2. تفاوت بین روش تست جعبه سیاه، جعبه خاکستری و جعبه سفید را تست نفوذ وب چیست؟
گری باکس gray box یا جعبه خاکستری گاهی اوقات پیش می آید یک سری اطلاعات اولیه مثل یوزر و پسورد پنل یا بایپس کردن waf را برای شما تسهیل می کنند.
وایت باکس یا whitebox یا جعبه سفید نوع ارزیابی که شما به کدهای دسترسی دارید و می توانید آسیب پذیری را از کد پیدا کنید.
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Telegram
InfoSecTube
از این کانال حمایت کنید تا بتواند به قابلیتهای اضافی دسترسی پیدا کند.
👍4
Redteam Tips
🔙 Hiding the Local Admin Account
♨️ Description: Creating accounts is risky when evading blue teams, but when you need to create a local admin, a little sorcery in the registry can help you hide it. This command adds a hidden local admin account, making it less likely to be detected during an incident response.
---
#redteam #cybersecurity #hacking #windows #regedit
---
🔉@infosectube
📌youtube channel
🎁Boost Us
🔙 Hiding the Local Admin Account
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /t REG_DWORD /v AlphaTest /d 0 /f
♨️ Description: Creating accounts is risky when evading blue teams, but when you need to create a local admin, a little sorcery in the registry can help you hide it. This command adds a hidden local admin account, making it less likely to be detected during an incident response.
---
#redteam #cybersecurity #hacking #windows #regedit
---
🔉@infosectube
📌youtube channel
🎁Boost Us
Telegram
InfoSecTube
از این کانال حمایت کنید تا بتواند به قابلیتهای اضافی دسترسی پیدا کند.
👍2
❌مصاحبه تست نفوذ وب❌
3. قبل از شروع تست نفوذ به چه صورت Scope را مشخص می کنید؟
مشخص کردن Scope قبل از قرارداد فی ما بین می باشد که ما بین شرکت تست نفوذ و کارفرما بسته می شود و در این قرار داد دامنه ها ساب دامنه و ای پی هایی که باید تست شوند ذکر شده است.
4. 10 آسیب پذیری OWASP چیست؟ کدام آسیب پذیری ها را کشف کردید چند نمونه ذکر کنید.
لیستی از مهم ترین یا خطرناک ترین آسیب پذیری ها می باشد. بله SQL injection ، XSS ، broken authentication.
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
3. قبل از شروع تست نفوذ به چه صورت Scope را مشخص می کنید؟
4. 10 آسیب پذیری OWASP چیست؟ کدام آسیب پذیری ها را کشف کردید چند نمونه ذکر کنید.
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Telegram
InfoSecTube
از این کانال حمایت کنید تا بتواند به قابلیتهای اضافی دسترسی پیدا کند.
👍4
❌مصاحبه تست نفوذ وب❌
5. فرض کنید سایتی آسیب پذیری SQLI دارد چه مراحلی برای کشف و اکسپلویت انجام می دهید چند ابزار نام ببرید.
اول به صورت دستی چک میکنم از تک کت ‘ و operand های sql استفاده میکنم برای تشخیص اگر error base باشد. اگر time base و blind باشد از burp و sqlmap کمک میکنم
پیلودهای SQLI برای تشخیص آسیب پذیر بودن یا نبودن را تست میکنم معمولا برای اینکار از intruder burp suite استفاده می کنم تا سریع تر بررسی کنم.
همچنین از SQLMAP برای تست کردن استفاده می کنم و پارامتر آسیب پذیر را با * مشخص میکنم.
6. با SQLMAP آشنا هستید؟ کار tamper چیست؟ چند تا Tamper را نام ببرید.
بله، tamper یک سری اسکریپت می باشد که نوع درخواست ما را تغییر می دهد تا web application firewall آن را بلاک نکند Between,base64encode,charencode,space2randomblan
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
5. فرض کنید سایتی آسیب پذیری SQLI دارد چه مراحلی برای کشف و اکسپلویت انجام می دهید چند ابزار نام ببرید.
پیلودهای SQLI برای تشخیص آسیب پذیر بودن یا نبودن را تست میکنم معمولا برای اینکار از intruder burp suite استفاده می کنم تا سریع تر بررسی کنم.
همچنین از SQLMAP برای تست کردن استفاده می کنم و پارامتر آسیب پذیر را با * مشخص میکنم.
6. با SQLMAP آشنا هستید؟ کار tamper چیست؟ چند تا Tamper را نام ببرید.
ب
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Telegram
InfoSecTube
از این کانال حمایت کنید تا بتواند به قابلیتهای اضافی دسترسی پیدا کند.
👍6❤1
❌مصاحبه تست نفوذ وب❌
7. حمله xss چیست؟ آیا می توانید نحوه جلوگیری از این آسیب پذیری را بگویید؟
حمله ای است که هکر اسکریپت مخرب را روی صفحه وبی که یوزرها آن را مشاهده می کنند تزریق کند.برای جلوگیری باید input validation و output encode داشت.
8. حمله CSRF چیست؟ چگونه کشف می کنید؟ چگونه می توان از آن جلوگیری کرد؟
یک حمله که هکر برازر browser یوزر را مجاب می کند یک عملیات ناخواسته را انجام دهد مثل تعویض پسورد.برای تست باید یک اسکریپت برای یک عملیات نوشت و تست کرد. جهت جلوگیری از چندین روش میشه استفاده کرد: استفاده از
csrf token
Same site cookies
Check referer header
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
7. حمله xss چیست؟ آیا می توانید نحوه جلوگیری از این آسیب پذیری را بگویید؟
8. حمله CSRF چیست؟ چگونه کشف می کنید؟ چگونه می توان از آن جلوگیری کرد؟
csrf token
Same site cookies
Check referer header
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Telegram
InfoSecTube
از این کانال حمایت کنید تا بتواند به قابلیتهای اضافی دسترسی پیدا کند.
❤4👍2
❌مصاحبه تست نفوذ وب❌
9. چند روش برای بایپس آپلودر بلد هستید؟ هر کدام را شرح دهید.
10. مشکل misconfiguration در وب چیست؟ چگونه کشف می کنید؟
وقتی پسورد دیفالت یا ضعیف داشته باشه برنامه آپدیت شده نباشند یا بشه بنر گربینگ کرد سرویس ها اینا همه misconfiguration security issues محسوب می شوند. برای چک کردن این موارد به صورت دستی و ابزارهای اتومات میشه چک کرد. Nmap hydra burp suite و...
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
9. چند روش برای بایپس آپلودر بلد هستید؟ هر کدام را شرح دهید.
File extension change
Shell.php1
Mime type change
image/jpeg
Case sensitive change
shell.Php1
Htaccess
AddType application/x-httpd-php .shell
10. مشکل misconfiguration در وب چیست؟ چگونه کشف می کنید؟
Source:Soheilsec
=========================
#Interview #مصاحبه
=========================
🔉@infosectube
📌youtube channel
🎁Boost Us
Telegram
InfoSecTube
از این کانال حمایت کنید تا بتواند به قابلیتهای اضافی دسترسی پیدا کند.
👍7