infosec
45.8K subscribers
902 photos
49 videos
93 files
1.23K links
Copyright: @SEAdm1n

Вакансии: @infosec_work

Информационная безопасность. Литература для ИТ специалистов. Пентест, DevOps, Администрирование.

Преобрести рекламное размещение: https://telega.in/c/it_secur
Download Telegram
👩‍💻 Attacking Android.

🟢Объемное руководство, которое описывает различные методы компрометации Android устройств.

🟢ContentProvider Management in Android Applications;
🟢Protecting Exported Services with Strong Permissions in Android;
🟢Protecting Against Directory Traversal Vulnerabilities in Android;
🟢Preventing Unauthorized Access to Sensitive Activities in Android;
🟢Avoid Storing Sensitive Information on External Storage (SD Card) Without Encryption;
🟢Logging Sensitive Information in Android;
🟢Securing Sensitive Data in Android;
🟢Cache;
🟢Do not use world readable or writeable to share files between apps;
🟢Do not broadcast sensitive information using an implicit intent;
🟢Do not allow WebView to access sensitive local resource through file scheme
🟢WebView Security Concerns;
🟢Do not provide addJavascriptInterface method access in a WebView which could contain untrusted content. (API level JELLY_BEAN or below)Noncompliant Code Example;
🟢Enable serialization compatibility during class evolution;
🟢Do not deviate from the proper signatures of serialization methods;
🟢Exclude unsanitized user input from format strings;
🟢Sanitize untrusted data included in a regular expression;
🟢Define wrappers around native methods;
🟢Do not allow exceptions to expose sensitive information;
🟢Do not encode noncharacter data as a string;
🟢Do not release apps that are debuggable;
🟢Consider privacy concerns when using Geolocation API;
🟢Properly verify server certificate on SSL/TLS;
🟢Specify permissions when creating files via the NDK.

#Android #DevSecOps
Please open Telegram to view this post
VIEW IN TELEGRAM
👩‍💻 Attacking Azure.

• Перенос IT-инфраструктуры в облака — это не дань моде: такой подход позволяет экономить на технической поддержке, резервном копировании и администрировании. К тому же размещение инфраструктуры в облаке считается более защищенным и от сбоев, и от внешних атак. Но есть и эффективные методы взлома наиболее популярных гибридно-облачных сред, таких как Azure. О таких техниках говориться в данной статье:

- Security Control;
- Execute Command on Virtual Machine using Custom Script Extension;
- Execute Commands on Virtual Machine using Run Command;
- Export Disk Through SAS URL;
- Password Hash Sync Abuse;
- Pass the PRT;
- Application proxy abuse;
- Command execution on a VM;
- Abusing dynamic groups;
- Illicit Consent Grant phishing;
- Add credentials to enterprise applications;
- Arm Templates and Deployment History;
- Hybrid identity - Seamless SSO;
- References.

#Azure #devsecops
Please open Telegram to view this post
VIEW IN TELEGRAM