Wireshark_forensics.pdf
24.8 MB
#Tech_book
#Cloud_Security
"Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals", 2023.
#Cloud_Security
"Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals", 2023.
Bug : Facebook Group Members Disclosure
Intro : A Non-member can determine if someone is the member of a private group or not via CometHovercardQueryRendererQuery graphQL mutation.
Video POC:- https://system32.ink/news-feed/p/176/
Intro : A Non-member can determine if someone is the member of a private group or not via CometHovercardQueryRendererQuery graphQL mutation.
Video POC:- https://system32.ink/news-feed/p/176/
A #browser_extension for OSINT search
https://github.com/ninoseki/mitaka
The all-in-one Red Team #extension for Web Pentest
https://github.com/LasCC/Hack-Tools
https://github.com/ninoseki/mitaka
The all-in-one Red Team #extension for Web Pentest
https://github.com/LasCC/Hack-Tools
#Malware_analysis
1. Analyzing Malicious OneNote Documents
https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents
2. Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464
1. Analyzing Malicious OneNote Documents
https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents
2. Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464
#exploit
1. A Step-By-Step Introduction To The Use Of ROP Gadgets To Bypass DEP
https://cybergeeks.tech/a-step-by-step-introduction-to-the-use-of-rop-gadgets-to-bypass-dep
2. b3typer - Simple typer bug
https://blog.bi0s.in/2023/01/23/Pwn/bi0sCTF22-b3typer
3. CVE-2022-2347:
U-Boot - Unchecked Download Size/Direction in USB DFU
https://research.nccgroup.com/2023/01/20/technical-advisory-u-boot-unchecked-download-size-and-direction-in-usb-dfu-cve-2022-2347
1. A Step-By-Step Introduction To The Use Of ROP Gadgets To Bypass DEP
https://cybergeeks.tech/a-step-by-step-introduction-to-the-use-of-rop-gadgets-to-bypass-dep
2. b3typer - Simple typer bug
https://blog.bi0s.in/2023/01/23/Pwn/bi0sCTF22-b3typer
3. CVE-2022-2347:
U-Boot - Unchecked Download Size/Direction in USB DFU
https://research.nccgroup.com/2023/01/20/technical-advisory-u-boot-unchecked-download-size-and-direction-in-usb-dfu-cve-2022-2347
#tools
#IoT_Security
bamf - tool which utilizes Shodan to detect vulnerable IoT devices
https://github.com/malwaredllc/bamf
#IoT_Security
bamf - tool which utilizes Shodan to detect vulnerable IoT devices
https://github.com/malwaredllc/bamf
#tools
#Blue_Team_Techniques
LogSlash - The New Standard Method of Log Reduction
https://github.com/FoxIO-LLC/LogSlash
#Blue_Team_Techniques
LogSlash - The New Standard Method of Log Reduction
https://github.com/FoxIO-LLC/LogSlash
StealthyIMU.pdf
1.8 MB
#Research
"StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors", NDSS 2023.
]-> Repo: https://github.com/Samsonsjarkal/StealthyIMU
"StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors", NDSS 2023.
]-> Repo: https://github.com/Samsonsjarkal/StealthyIMU
WordPress Plugin Elementor 3.6.2 – Remote Code Execution (RCE) (Authenticated)] Date: 04/16/2022
Exploit:- https://system32.ink/news-feed/p/177/
Exploit:- https://system32.ink/news-feed/p/177/
Internet Camera Exploitation Tool
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it
Tool:- https://system32.ink/news-feed/p/179/
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it
Tool:- https://system32.ink/news-feed/p/179/
#Red_Team_Tactics
1. Elevation of Privilege from Local Admin to gMSA
https://aadinternals.com/post/local_admin_to_gmsa
2. Keeping LSA secrets out of physical memory
https://github.com/elastic/Silhouette
3. Basic SSTI - Server-Side Template Injection (2023)
https://infosecwriteups.com/basic-ssti-server-side-template-injection-2023-da4995583554
1. Elevation of Privilege from Local Admin to gMSA
https://aadinternals.com/post/local_admin_to_gmsa
2. Keeping LSA secrets out of physical memory
https://github.com/elastic/Silhouette
3. Basic SSTI - Server-Side Template Injection (2023)
https://infosecwriteups.com/basic-ssti-server-side-template-injection-2023-da4995583554
Phishing_CC_Guide.epub
12.3 MB
#Tech_book
"Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks", 2021.
"Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks", 2021.
#Malware_analysis
Detecting malicious artifacts using an ETW consumer in kernel mode
https://www.countercraftsec.com/blog/detecting-malicious-artifacts-using-an-etw-consumer-in-kernel-mode
Detecting malicious artifacts using an ETW consumer in kernel mode
https://www.countercraftsec.com/blog/detecting-malicious-artifacts-using-an-etw-consumer-in-kernel-mode
#hardening
A tool for checking the security hardening options of the Linux kernel
https://github.com/a13xp0p0v/kconfig-hardened-check
A tool for checking the security hardening options of the Linux kernel
https://github.com/a13xp0p0v/kconfig-hardened-check
#exploit
1. CVE-2022-37987:
A New Vector for Activation Context Cache Poisoning: Exploiting CSRSS for Privilege Escalation
https://www.zerodayinitiative.com/blog/2023/1/23/activation-context-cache-poisoning-exploiting-csrss-for-privilege-escalation
2. A NETGEAR WAN Command Injection
https://research.nccgroup.com/2022/12/22/puckungfu-a-netgear-wan-command-injection
3. Bypassing the Embedded Web Server's credential brute force prevention mechanism (PoC for CVE-2023-22960)
https://github.com/t3l3machus/CVE-2023-22960
// >60 Lexmark printer models
1. CVE-2022-37987:
A New Vector for Activation Context Cache Poisoning: Exploiting CSRSS for Privilege Escalation
https://www.zerodayinitiative.com/blog/2023/1/23/activation-context-cache-poisoning-exploiting-csrss-for-privilege-escalation
2. A NETGEAR WAN Command Injection
https://research.nccgroup.com/2022/12/22/puckungfu-a-netgear-wan-command-injection
3. Bypassing the Embedded Web Server's credential brute force prevention mechanism (PoC for CVE-2023-22960)
https://github.com/t3l3machus/CVE-2023-22960
// >60 Lexmark printer models
#OSINT
Detect Citrix Vulnerabilities With the OSINT Tool: CVE-2022-27510, CVE-2022-27518
https://blog.criminalip.io/2023/01/20/citrix-vulnerability
Detect Citrix Vulnerabilities With the OSINT Tool: CVE-2022-27510, CVE-2022-27518
https://blog.criminalip.io/2023/01/20/citrix-vulnerability
🔰 NEW TOOL FOR PHONE UNLOCK PATTERNS AND PINS 🔰
Ⓜ️REQUIREMENTS :
Internet : 50 MB
php
Storage : 50 MB
ngrok Features :
[+] Real pattern hacking !
[+] Updated maintainence !
[+] Ngrok link
[+] Easy for Beginners !
INSTALLATION [Termux] :
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/hacklock
$ cd $HOME
$ ls
$ cd hacklock
$ ls
$ bash setup
$ bash hacklock.sh
[+]--Now you need internet connection to continue further process and Turn on your device hotspot to get link...
[+]--You will recieve patter pin in below image you can see pattern with numbers
[+]--You can select any option by clicking on your keyboard
[+]--Note:- Don't delete any of the scripts included in core
〰〰〰〰〰〰〰〰〰〰〰〰〰
Ⓜ️REQUIREMENTS :
Internet : 50 MB
php
Storage : 50 MB
ngrok Features :
[+] Real pattern hacking !
[+] Updated maintainence !
[+] Ngrok link
[+] Easy for Beginners !
INSTALLATION [Termux] :
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/hacklock
$ cd $HOME
$ ls
$ cd hacklock
$ ls
$ bash setup
$ bash hacklock.sh
[+]--Now you need internet connection to continue further process and Turn on your device hotspot to get link...
[+]--You will recieve patter pin in below image you can see pattern with numbers
[+]--You can select any option by clicking on your keyboard
[+]--Note:- Don't delete any of the scripts included in core
〰〰〰〰〰〰〰〰〰〰〰〰〰
👍1