Source Byte
7.8K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Cross-Platform Malware Written in Go

maldbg.com/ipstorm-golang-ma…



#malware , #analysis , #go
❤‍🔥2
Analyzing AsyncRAT's Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases

trendmicro.com/en_us/researc…


#AsyncRAT , #code_injection , #analysis
👍4
exploiting a use-after-free in Linux kernel 5.15 (Ubuntu 22.04) (CVE-2022-32250)

credit: @saidelike

research.nccgroup.com/2022/0

#linux , #kernel , #analysis , #exploitation
__
@islemolecule_source
VirtualBox internals and exploitation (CVE-2023-21987 and CVE-2023-21991)

credit : @qriousec

https://qriousec.github.io/post/vbox-pwn2own-2023/

#virtualbox , #analysis ,
———
@islemolecule_source
👍4
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable

securityonline.info/cve-2023…


#CVE , #analysis
———
@islemolecule_source
👍32
Forwarded from Ai000 Cybernetics QLab (Milad Kahsari Alhadi)
In this research paper which is first part of the system analysis series, our team at ACQL has embarked on an exploratory journey to thoroughly understand general systems concepts, aiming to extrapolate these concepts to broader system typologies. Our initial findings suggest that systems, universally, exhibit 9 fundamental characteristics. Furthermore, we identify that any entity defined as a system is susceptible to both internal and external threats, necessitating robust protective measures.

Our analysis progresses into a detailed examination of various data terminologies, along with their types and states, focusing primarily on concepts such as information and intelligence. This foundational understanding of data dynamics has enabled us to advance our study into high-level analyses of software-based systems and binaries. By doing so, we have been able to identify potential vulnerabilities within these systems. The culmination of our research involves developing strategies to exploit these identified weaknesses effectively, thereby gaining control over the systems in question.

This comprehensive approach not only enhances our understanding of system security but also contributes to the development of more secure computing environments.

ACQL Website: link

@aioooir | #analysis #acql #research
7
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM