CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Wireshark_forensics.pdf
24.8 MB
#Tech_book
#Cloud_Security
"Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals", 2023.
Java XML security issues and how to address them

https://semgrep.dev/blog/2022/xml-security-in-java
Bug : Facebook Group Members Disclosure

Intro : A Non-member can determine if someone is the member of a private group or not via CometHovercardQueryRendererQuery graphQL mutation.

Video POC:- https://system32.ink/news-feed/p/176/
#Malware_analysis
1. Analyzing Malicious OneNote Documents
https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents
2. Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464
#tools
#IoT_Security
bamf - tool which utilizes Shodan to detect vulnerable IoT devices
https://github.com/malwaredllc/bamf
#tools
#Blue_Team_Techniques
LogSlash - The New Standard Method of Log Reduction
https://github.com/FoxIO-LLC/LogSlash
StealthyIMU.pdf
1.8 MB
#Research
"StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors", NDSS 2023.

]-> Repo: https://github.com/Samsonsjarkal/StealthyIMU
NIST_SP_800-190.pdf
650.6 KB
#Infosec_Standards
NIST SP 800-190:
"Application Container Security Guide", 2017.
WordPress Plugin Elementor 3.6.2 – Remote Code Execution (RCE) (Authenticated)] Date: 04/16/2022

Exploit:- https://system32.ink/news-feed/p/177/
Internet Camera Exploitation Tool
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io

I was able to discover thousands of vulnerable cameras using it

Tool:- https://system32.ink/news-feed/p/179/
#Red_Team_Tactics
1. Elevation of Privilege from Local Admin to gMSA
https://aadinternals.com/post/local_admin_to_gmsa
2. Keeping LSA secrets out of physical memory
https://github.com/elastic/Silhouette
3. Basic SSTI - Server-Side Template Injection (2023)
https://infosecwriteups.com/basic-ssti-server-side-template-injection-2023-da4995583554
Phishing_CC_Guide.epub
12.3 MB
#Tech_book
"Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks", 2021.
#hardening
A tool for checking the security hardening options of the Linux kernel
https://github.com/a13xp0p0v/kconfig-hardened-check