❤🔥2
Analyzing AsyncRAT's Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases
trendmicro.com/en_us/researc…
#AsyncRAT , #code_injection , #analysis
trendmicro.com/en_us/researc…
#AsyncRAT , #code_injection , #analysis
👍4
TLDR; 4 new releases from @myhackerhouse
for your malware development and analysis purposes with 3 re-created from the CIA's Vault7 leak.
1. https://github.com/hackerhouse-opensource/marble
2. https://github.com/hackerhouse-opensource/WMIProcessWatcher
3. https://github.com/hackerhouse-opensource/Artillery
4. https://github.com/hackerhouse-opensource/SignToolEx
#malware_dev ,#analysis ,
———
@islemolecule_source
for your malware development and analysis purposes with 3 re-created from the CIA's Vault7 leak.
1. https://github.com/hackerhouse-opensource/marble
2. https://github.com/hackerhouse-opensource/WMIProcessWatcher
3. https://github.com/hackerhouse-opensource/Artillery
4. https://github.com/hackerhouse-opensource/SignToolEx
#malware_dev ,#analysis ,
———
@islemolecule_source
exploiting a use-after-free in Linux kernel 5.15 (Ubuntu 22.04) (CVE-2022-32250)
credit: @saidelike
research.nccgroup.com/2022/0…
#linux , #kernel , #analysis , #exploitation
__
@islemolecule_source
credit: @saidelike
research.nccgroup.com/2022/0…
#linux , #kernel , #analysis , #exploitation
__
@islemolecule_source
VirtualBox internals and exploitation (CVE-2023-21987 and CVE-2023-21991)
credit : @qriousec
https://qriousec.github.io/post/vbox-pwn2own-2023/
#virtualbox , #analysis ,
———
@islemolecule_source
credit : @qriousec
https://qriousec.github.io/post/vbox-pwn2own-2023/
#virtualbox , #analysis ,
———
@islemolecule_source
a great series for learning Linux kernel exploitation
CVE-2017-11176 (UaF in mq_notify function)
Credit: @LexfoSecurite
[ 1 ] blog.lexfo.fr/cve-2017-11176…
[ 2 ] blog.lexfo.fr/cve-2017-11176…
[ 3 ] blog.lexfo.fr/cve-2017-11176…
[ 4 ] blog.lexfo.fr/cve-2017-11176…
#CVE , #analysis , #old_but_gold
——-
@islemolecule_source
CVE-2017-11176 (UaF in mq_notify function)
Credit: @LexfoSecurite
[ 1 ] blog.lexfo.fr/cve-2017-11176…
[ 2 ] blog.lexfo.fr/cve-2017-11176…
[ 3 ] blog.lexfo.fr/cve-2017-11176…
[ 4 ] blog.lexfo.fr/cve-2017-11176…
#CVE , #analysis , #old_but_gold
——-
@islemolecule_source
👍4
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable
securityonline.info/cve-2023…
#CVE , #analysis
———
@islemolecule_source
securityonline.info/cve-2023…
#CVE , #analysis
———
@islemolecule_source
👍3❤2
Forwarded from Ai000 Cybernetics QLab (Milad Kahsari Alhadi)
In this research paper which is first part of the system analysis series, our team at ACQL has embarked on an exploratory journey to thoroughly understand general systems concepts, aiming to extrapolate these concepts to broader system typologies. Our initial findings suggest that systems, universally, exhibit 9 fundamental characteristics. Furthermore, we identify that any entity defined as a system is susceptible to both internal and external threats, necessitating robust protective measures.
Our analysis progresses into a detailed examination of various data terminologies, along with their types and states, focusing primarily on concepts such as information and intelligence. This foundational understanding of data dynamics has enabled us to advance our study into high-level analyses of software-based systems and binaries. By doing so, we have been able to identify potential vulnerabilities within these systems. The culmination of our research involves developing strategies to exploit these identified weaknesses effectively, thereby gaining control over the systems in question.
This comprehensive approach not only enhances our understanding of system security but also contributes to the development of more secure computing environments.
ACQL Website: link
@aioooir | #analysis #acql #research
Our analysis progresses into a detailed examination of various data terminologies, along with their types and states, focusing primarily on concepts such as information and intelligence. This foundational understanding of data dynamics has enabled us to advance our study into high-level analyses of software-based systems and binaries. By doing so, we have been able to identify potential vulnerabilities within these systems. The culmination of our research involves developing strategies to exploit these identified weaknesses effectively, thereby gaining control over the systems in question.
This comprehensive approach not only enhances our understanding of system security but also contributes to the development of more secure computing environments.
ACQL Website: link
@aioooir | #analysis #acql #research
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM