Alaid TechThread
@offensive_thread
677
subscribers
6
photos
1
video
83
files
1.31K
links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
Join
Alaid TechThread
677 subscribers
Alaid TechThread
https://habrahabr.ru/company/pentestit/blog/336900/
Habr
Маскировка UDP трафика в TCP/ICMP при помощи udp2raw
В данной статье речь пойдет про утилиту udp2raw, которая позволяет обходить межсетевые экраны, настроенные на блокировку протокола UDP, используя RAW сокеты,...
Alaid TechThread
https://blog.newskysecurity.com/a-huge-wave-of-iot-zombies-are-coming-42d61d6cada0
NewSky Security
A Huge Wave of IoT Zombies Is Coming
Introduction
Alaid TechThread
https://bartblaze.blogspot.ru/2017/10/comparing-eternalpetya-and-badrabbit.html
bartblaze.blogspot.co.uk
Comparing EternalPetya and BadRabbit
A blog about malware and information security.
Alaid TechThread
https://fail0verflow.com/blog/2017/ps4-namedobj-exploit/
Alaid TechThread
https://twitter.com/malwareunicorn/status/923271986599534593
Twitter
Amanda Rousseau
Here is my analysis of #BadRabbit @EndgameInc https://t.co/D5w0Lo6BZb
Alaid TechThread
#CTF
#Железо
#SMT
https://blog.dragonsector.pl/2017/10/pwn2win-2017-shift-register.html
blog.dragonsector.pl
Pwn2Win 2017 - Shift Register
Disclaimer : I am not an electronics engineer. I just play one on Twitter. A lot of the following might be heresy to someone who ever ...
Alaid TechThread
https://github.com/mwrlabs/OSXFuzz
GitHub
mwrlabs/OSXFuzz
macOS Kernel Fuzzer. Contribute to mwrlabs/OSXFuzz development by creating an account on GitHub.
Alaid TechThread
https://greatscottgadgets.com/pocorgtfo/pocorgtfo16.pdf
Alaid TechThread
https://resources.infosecinstitute.com/common-malware-persistence-mechanisms/#gref
Infosecinstitute
Common malware persistence mechanisms | Infosec
As we know, malware becomes stealthier by somehow achieving persistence on the exploited machine. This helps malware authors to inject/exploit once, and the
Alaid TechThread
https://jumpespjump.blogspot.ru/2015/05/many-ways-of-malware-persistence-that.html
jumpespjump.blogspot.co.uk
Many ways of malware persistence (that you were always afraid to ask)
TL;DR: Are you into red teaming? Need persistence? This post is not that long, read it ;) Are you into blue teaming? Have to find those p...
Alaid TechThread
Распространенные техники закрепления в системе
Alaid TechThread
https://labs.mwrinfosecurity.com/assets/resourceFiles/DefCon25-UAC-0day-All-Day-v2.2.pdf
Alaid TechThread
https://logrhythm.com/blog/notpetya-technical-analysis/
LogRhythm
NotPetya Technical Analysis | LogRhythm
Although initially labeled as ransomware due to the ransom message that is displayed after infection, it appears now that NotPetya functions more as a destructive wiper-like tool than actual ransomware
Alaid TechThread
https://www.intezer.com/notpetya-returns-bad-rabbit/
Intezer
NotPetya Returns as Bad Rabbit - Intezer
Large scale cyber attacks seem to be happening once a month these days. Originally discovered by ESET (https://www.welivesecurity.com/2017/10/24/kiev-metro-hit-new-variant-infamous-diskcoder-ransomware/), Ukrainian and Russian organizations have been hit…
Alaid TechThread
https://marcoramilli.blogspot.ru/2016/06/from-rop-to-lop-bypassing-control-flow.html?m=1
marcoramilli.blogspot.co.uk
From ROP to LOP bypassing Control FLow Enforcement
Hacking, Malware Evasions, Penetration testing, Targeted attacks, Malware analysis and everything related to Cyber Security Field.
Alaid TechThread
Windows Memory Forensics
https://cerbero-blog.com/?p=1682
Alaid TechThread
Статья про угон поддоменов
https://cody.su/blog/hostile-subdomain-takeovers/
Cody Zacharias
Hostile Subdomain Takeovers++
Advanced Hostile Subdomain Takeover discovery techniques and attack scenarios. This article is intended for people already familiar with subdomain takeovers.
Alaid TechThread
и инструмент для скана:
https://github.com/haccer/subjack
GitHub
GitHub - haccer/subjack: Subdomain Takeover tool written in Go
Subdomain Takeover tool written in Go. Contribute to haccer/subjack development by creating an account on GitHub.
Alaid TechThread
https://techincidents.com/penetration-testing-cheat-sheet/
Tech
Penetration Testing Cheat Sheet For Windows Machine
In the event that your Windows machine has been compromised or for any other reason, this cheat sheet is intended to help.Penetration Testing Cheat Sheet
Alaid TechThread
Эксплуатация в .NET:
https://googleprojectzero.blogspot.ru/2017/04/exploiting-net-managed-dcom.html
Blogspot
Exploiting .NET Managed DCOM
Posted by James Forshaw, Project Zero One of the more interesting classes of security vulnerabilities are those affecting interoperabili...
Alaid TechThread
Видео с DEFCON Packet Village:
https://www.youtube.com/playlist?list=PL9fPq3eQfaaAxfsGhSV51abnG1LUir72x
YouTube
DEF CON 25 Packet Hacking Village - YouTube