BeRoot For Windows
بررسی امکان بالابردن سطح دسترسی در ویندوز با سوء استفاده از ضعف در پیکربندی
https://github.com/AlessandroZ/BeRoot/tree/master/Windows
#windows
#privesc
#pivoting
#pentest
#network
@sec_nerd
بررسی امکان بالابردن سطح دسترسی در ویندوز با سوء استفاده از ضعف در پیکربندی
https://github.com/AlessandroZ/BeRoot/tree/master/Windows
#windows
#privesc
#pivoting
#pentest
#network
@sec_nerd
GitHub
BeRoot/Windows at master · AlessandroZ/BeRoot
Privilege Escalation Project - Windows / Linux / Mac - AlessandroZ/BeRoot
راهکارهایی برای افزایش امنیت دامین های ویندوزی
https://github.com/PaulSec/awesome-windows-domain-hardening
#security
#windows
#network
@sec_nerd
https://github.com/PaulSec/awesome-windows-domain-hardening
#security
#windows
#network
@sec_nerd
GitHub
GitHub - PaulSec/awesome-windows-domain-hardening: A curated list of awesome Security Hardening techniques for Windows.
A curated list of awesome Security Hardening techniques for Windows. - PaulSec/awesome-windows-domain-hardening
مقالاتی در خصوص رمزنگاری برای علاقمندان این حوزه
https://github.com/pFarb/awesome-crypto-papers
#crypto
#paper
#cryptography
@sec_nerd
https://github.com/pFarb/awesome-crypto-papers
#crypto
#paper
#cryptography
@sec_nerd
GitHub
GitHub - pFarb/awesome-crypto-papers: A curated list of cryptography papers, articles, tutorials and howtos.
A curated list of cryptography papers, articles, tutorials and howtos. - pFarb/awesome-crypto-papers
امنیت اطلاعات
Evil Maid Attack Demo
در این عملیات، firmware یا بایوس لپتاپ فلش میشود.
به گفته Shkatov سازنده این روش و ابزار، دستگاه فلش کننده ۲۸۵ دلار قیمت دارد و نرم افزار بکدور نیز در گیتهاب در اختیار عموم قرار دارد
https://github.com/cr4sh/smmbackdoor
منبع:
https://motherboard.vice.com/en_us/article/a3q374/hacker-bios-firmware-backdoor-evil-maid-attack-laptop-5-minutes?utm_source=mbtwitter
#hardware
#backdoor
#uefi
#firmware
@sec_nerd
به گفته Shkatov سازنده این روش و ابزار، دستگاه فلش کننده ۲۸۵ دلار قیمت دارد و نرم افزار بکدور نیز در گیتهاب در اختیار عموم قرار دارد
https://github.com/cr4sh/smmbackdoor
منبع:
https://motherboard.vice.com/en_us/article/a3q374/hacker-bios-firmware-backdoor-evil-maid-attack-laptop-5-minutes?utm_source=mbtwitter
#hardware
#backdoor
#uefi
#firmware
@sec_nerd
GitHub
GitHub - Cr4sh/SmmBackdoor: First open source and publicly available System Management Mode backdoor for UEFI based platforms.…
First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for various SMM experiments. - GitHub - Cr4sh/SmmBackdoor: Firs...
هنر کشف ساب دامین ها
https://blog.sweepatic.com/art-of-subdomain-enumeration/
#subdomain
#enum
#pentest
#web
@sec_nerd
https://blog.sweepatic.com/art-of-subdomain-enumeration/
#subdomain
#enum
#pentest
#web
@sec_nerd
Sweepatic Blog
The Art of Subdomain Enumeration
We will set you up with all you need to know about Subdomain enumeration. Cyber attackers map out the digital footprint of the target in order to find weak spots to gain for example access to an internal network. Already know enough?
آموزش اکسپلویت کردن کرنل ویندوز در ۸ قسمت
قسمت اول:
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
قسمت دوم:
https://rootkits.xyz/blog/2017/08/kernel-stack-overflow/
قسمت سوم:
https://rootkits.xyz/blog/2017/09/kernel-write-what-where/
قسمت چهارم:
https://rootkits.xyz/blog/2017/11/kernel-pool-overflow/
قسمت پنجم:
https://rootkits.xyz/blog/2018/01/kernel-null-pointer-dereference/
قسمت ششم:
https://rootkits.xyz/blog/2018/01/kernel-uninitialized-stack-variable/
قسمت هفتم:
https://rootkits.xyz/blog/2018/03/kernel-uninitialized-heap-variable/
قسمت هشتم:
https://rootkits.xyz/blog/2018/04/kernel-use-after-free/
⭕️ این پست به روز رسانی میشود ⭕️
#windows
#exploit
#kernel
@sec_nerd
قسمت اول:
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
قسمت دوم:
https://rootkits.xyz/blog/2017/08/kernel-stack-overflow/
قسمت سوم:
https://rootkits.xyz/blog/2017/09/kernel-write-what-where/
قسمت چهارم:
https://rootkits.xyz/blog/2017/11/kernel-pool-overflow/
قسمت پنجم:
https://rootkits.xyz/blog/2018/01/kernel-null-pointer-dereference/
قسمت ششم:
https://rootkits.xyz/blog/2018/01/kernel-uninitialized-stack-variable/
قسمت هفتم:
https://rootkits.xyz/blog/2018/03/kernel-uninitialized-heap-variable/
قسمت هشتم:
https://rootkits.xyz/blog/2018/04/kernel-use-after-free/
⭕️ این پست به روز رسانی میشود ⭕️
#windows
#exploit
#kernel
@sec_nerd
rootkit
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
Intro Recently, I had the pleasure to attend the training on Windows Kernel Exploitation at nullcon by the HackSysTeam. The training was well executed, and I got the intro into the world of kernel. But, as you know, nobody could teach you internals about…