Linux, Material de hacking y noticias
@Linux_and_hacking_material
1.47K
subscribers
246
photos
28
videos
3.36K
files
9.66K
links
Canal destinado a diversos contenidos: material de Linux, hacking y seguridad informática
Download Telegram
Join
Linux, Material de hacking y noticias
1.47K subscribers
Linux, Material de hacking y noticias
https://mega.nz/folder/wlxiGSzb#ogF6DyEa4PwCTR-H0MLmlw
mega.nz
5.07 GB folder on MEGA
11 files
Linux, Material de hacking y noticias
https://securelist.com/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign/101519/
Securelist
APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign
A41APT is a long-running campaign with activities detected from March 2019 to the end of December 2020. Most of the discovered malware families are fileless malware and they have not been seen before.
Linux, Material de hacking y noticias
https://github.com/zidansec/CrimeFlare
GitHub
zidansec/CrimeFlare
This tool can help you to see the real IP behind CloudFlare protected websites. - zidansec/CrimeFlare
Linux, Material de hacking y noticias
https://www.fireeye.com/blog/threat-research/2021/03/attacker-use-of-windows-background-intelligent-transfer-service.html
Google Cloud Blog
Attacker Use Background Intelligent Transfer Service (BITS) | Google Cloud Blog
Learn how attackers use the Windows Background Intelligent Transfer Service (BITS) as a method for maintaining the persistence of malicious applications.
Linux, Material de hacking y noticias
https://underdefense.com/how-to-detect-cobaltstrike-command-control-communication/
UnderDefense
How to Detect CobaltStrike Command & Control Communication - UnderDefense
CobaltStrike became part of the Cybercrime’s “toolset” almost in every Company breach. This growth is explained by the fact that CobaltStrike was leaked multiple times and became more accessible for malicious groups. Below is a statistics made by RecordedFuture…
Linux, Material de hacking y noticias
https://www.youtube.com/watch?v=XyLY2pn4s7Y&t=51s&ab_channel=CyberSecurityforall
YouTube
Daily malicious emails 2/4/2021
I'm gonna give you malicious emails everyday .. so please check these emails in your organization or at your personal emails.
if You wanna support me in patron , thank you
https://www.patreon.com/MahmoudElMenshawy?fbclid=IwAR2lZM5Ecj4gn780pWhpdPIEtK…
Linux, Material de hacking y noticias
https://m.youtube.com/watch?v=ZGrTMyDhg4Q&ab_channel=CyberSecurityforall
YouTube
Analysis of AgentTesla
You will find a written report here
my blogger
https://menshaway.blogspot.com/2021/04/agenttesla-malware.html
IF You wanna support me in patron , thank you
https://www.patreon.com/MahmoudElMenshawy?fbclid=IwAR2lZM5Ecj4gn780pWhpdPIEtKmt1EUTqgrVCvl38Y…
Linux, Material de hacking y noticias
https://speakerdeck.com/fr0gger/windows-privileges
Speaker Deck
Windows Privileges
A cheat sheet about Microsoft Windows Privileges.
Linux, Material de hacking y noticias
https://github.com/0vercl0k/CVE-2021-24086
GitHub
GitHub - 0vercl0k/CVE-2021-24086: Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.
Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely. - 0vercl0k/CVE-2021-24086
Linux, Material de hacking y noticias
https://blog.quarkslab.com/analysis-of-a-windows-ipv6-fragmentation-vulnerability-cve-2021-24086.html
Quarkslab
Analysis of a Windows IPv6 Fragmentation Vulnerability: CVE-2021-24086 - Quarkslab's blog
In this blog post we analyze a denial of service vulnerability affecting the IPv6 stack of Windows. This issue, whose root cause can be found in the mishandling of IPv6 fragments, was patched by Microsoft in their February 2021 security bulletin.
Linux, Material de hacking y noticias
https://securityonline.info/r77-rootkit-fileless-persistence/
securityonline.info
r77 Rootkit v1.5.1 releases: single file installer and fileless persistence that hides processes, files, network connections
Fileless persistence: The rootkit resides in the system memory and does not write any files to the disk. This is achieved in multiple stages.
Linux, Material de hacking y noticias
https://gorkemkaradeniz.medium.com/defeating-runasppl-utilizing-vulnerable-drivers-to-read-lsass-with-mimikatz-28f4b50b1de5
Medium
Defeating RunAsPPL: Utilizing Vulnerable Drivers to Read Lsass with Mimikatz
In this article we review methods to extract credentials from lsass process memory despite LSA protection and RunAsPPL registry settings.
Linux, Material de hacking y noticias
https://github.com/shellphish/how2heap
GitHub
GitHub - shellphish/how2heap: A repository for learning various heap exploitation techniques.
A repository for learning various heap exploitation techniques. - shellphish/how2heap
Linux, Material de hacking y noticias
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/XXE%20Injection/README.md
GitHub
PayloadsAllTheThings/XXE Injection/README.md at master · swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
Linux, Material de hacking y noticias
https://labs.nettitude.com/blog/vm-detection-tricks-part-1-physical-memory-resource-maps/
LRQA
VM Detection Tricks, Part 1: Physical memory resource maps
In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021. These detection tricks will be focused on 64-bit Windows 10 or Windows Server 2019 guests, targeting a variety of VM platforms.
Linux, Material de hacking y noticias
https://movaxbx.ru/2021/04/11/process-herpaderping/
Linux, Material de hacking y noticias
https://github.com/snovvcrash/DivideAndScan
GitHub
GitHub - snovvcrash/DivideAndScan: Divide full port scan results and use it for targeted Nmap runs
Divide full port scan results and use it for targeted Nmap runs - snovvcrash/DivideAndScan
Linux, Material de hacking y noticias
https://www.debuggingbook.org/html/Debugger.html
www.debuggingbook.org
How Debuggers Work - The Debugging Book
Interactive debuggers are tools that allow you to selectively observe the program state during an execution. In this chapter, you will learn how such debuggers work – by building your own debugger.Prerequisites You should have read the Chapter on Tracing…
Linux, Material de hacking y noticias
https://iamelli0t.github.io/2021/04/10/RPC-Bypass-CFG.html
iamelli0t’s blog
Exploiting Windows RPC to bypass CFG mitigation: analysis of CVE-2021-26411 in-the-wild sample
The general method of browser render process exploit is: after exploiting the vulnerability to obtain user mode arbitrary memory read/write primitive, the vtable of DOM/js object is tampered to hijack the code execution flow. Then VirtualProtect is called…
Linux, Material de hacking y noticias
https://noncombatant.org/2021/04/11/long-live-sandboxing/
Linux, Material de hacking y noticias
EE | How to understand dirtyCOW vulnerability |
https://devilinside.me/blogs/how-understand-dirtycow-vulnerability
devilinside.me
UNLEASH THE BEAST | THE FUTURE
Expect memes, food for thoughts, tech guidelines and trash talk daily.