Linux, Material de hacking y noticias
@Linux_and_hacking_material
1.5K
subscribers
246
photos
28
videos
3.36K
files
9.66K
links
Canal destinado a diversos contenidos: material de Linux, hacking y seguridad informática
Download Telegram
Join
Linux, Material de hacking y noticias
1.5K subscribers
Linux, Material de hacking y noticias
https://github.com/0vercl0k/CVE-2021-24086
GitHub
GitHub - 0vercl0k/CVE-2021-24086: Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.
Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely. - 0vercl0k/CVE-2021-24086
Linux, Material de hacking y noticias
https://blog.quarkslab.com/analysis-of-a-windows-ipv6-fragmentation-vulnerability-cve-2021-24086.html
Quarkslab
Analysis of a Windows IPv6 Fragmentation Vulnerability: CVE-2021-24086 - Quarkslab's blog
In this blog post we analyze a denial of service vulnerability affecting the IPv6 stack of Windows. This issue, whose root cause can be found in the mishandling of IPv6 fragments, was patched by Microsoft in their February 2021 security bulletin.
Linux, Material de hacking y noticias
https://securityonline.info/r77-rootkit-fileless-persistence/
securityonline.info
r77 Rootkit v1.5.1 releases: single file installer and fileless persistence that hides processes, files, network connections
Fileless persistence: The rootkit resides in the system memory and does not write any files to the disk. This is achieved in multiple stages.
Linux, Material de hacking y noticias
https://gorkemkaradeniz.medium.com/defeating-runasppl-utilizing-vulnerable-drivers-to-read-lsass-with-mimikatz-28f4b50b1de5
Medium
Defeating RunAsPPL: Utilizing Vulnerable Drivers to Read Lsass with Mimikatz
In this article we review methods to extract credentials from lsass process memory despite LSA protection and RunAsPPL registry settings.
Linux, Material de hacking y noticias
https://github.com/shellphish/how2heap
GitHub
GitHub - shellphish/how2heap: A repository for learning various heap exploitation techniques.
A repository for learning various heap exploitation techniques. - shellphish/how2heap
Linux, Material de hacking y noticias
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/XXE%20Injection/README.md
GitHub
PayloadsAllTheThings/XXE Injection/README.md at master · swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
Linux, Material de hacking y noticias
https://labs.nettitude.com/blog/vm-detection-tricks-part-1-physical-memory-resource-maps/
LRQA
VM Detection Tricks, Part 1: Physical memory resource maps
In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021. These detection tricks will be focused on 64-bit Windows 10 or Windows Server 2019 guests, targeting a variety of VM platforms.
Linux, Material de hacking y noticias
https://movaxbx.ru/2021/04/11/process-herpaderping/
Linux, Material de hacking y noticias
https://github.com/snovvcrash/DivideAndScan
GitHub
GitHub - snovvcrash/DivideAndScan: Divide full port scan results and use it for targeted Nmap runs
Divide full port scan results and use it for targeted Nmap runs - snovvcrash/DivideAndScan
Linux, Material de hacking y noticias
https://www.debuggingbook.org/html/Debugger.html
www.debuggingbook.org
How Debuggers Work - The Debugging Book
Interactive debuggers are tools that allow you to selectively observe the program state during an execution. In this chapter, you will learn how such debuggers work – by building your own debugger.Prerequisites You should have read the Chapter on Tracing…
Linux, Material de hacking y noticias
https://iamelli0t.github.io/2021/04/10/RPC-Bypass-CFG.html
iamelli0t’s blog
Exploiting Windows RPC to bypass CFG mitigation: analysis of CVE-2021-26411 in-the-wild sample
The general method of browser render process exploit is: after exploiting the vulnerability to obtain user mode arbitrary memory read/write primitive, the vtable of DOM/js object is tampered to hijack the code execution flow. Then VirtualProtect is called…
Linux, Material de hacking y noticias
https://noncombatant.org/2021/04/11/long-live-sandboxing/
Linux, Material de hacking y noticias
EE | How to understand dirtyCOW vulnerability |
https://devilinside.me/blogs/how-understand-dirtycow-vulnerability
devilinside.me
UNLEASH THE BEAST | THE FUTURE
Expect memes, food for thoughts, tech guidelines and trash talk daily.
Linux, Material de hacking y noticias
https://infosecwriteups.com/unauthenticated-account-takeover-through-forget-password-c120b4c1141d
Medium
Unauthenticated Account Takeover Through Forget Password
I was hunting a full month on a federal private program and comes up with plenty of account takeovers. I am going to share one of the…
Linux, Material de hacking y noticias
https://marcusedmondson.com/2021/04/12/ssh-tunnelling/
Marcus Edmondson | Threat Hunting | Information Security
SSH Tunnelling
In today’s blog post I wanted to talk about Secure Shell (SSH) and some of its powerful features. We will start with some of the basics such as what it is, what it does, and then more advance…
Linux, Material de hacking y noticias
https://github.com/rmlibre/aiootp
GitHub
GitHub - rmlibre/aiootp: An asynchronous pseudo one-time pad based crypto and anonymity library.
An asynchronous pseudo one-time pad based crypto and anonymity library. - GitHub - rmlibre/aiootp: An asynchronous pseudo one-time pad based crypto and anonymity library.
Linux, Material de hacking y noticias
https://0xinfection.github.io/reversing/
Linux, Material de hacking y noticias
https://github.com/shabarkin/aws-enumerator
GitHub
GitHub - shabarkin/aws-enumerator: The AWS Enumerator was created for service enumeration and info dumping for investigations of…
The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testing. The tool is intended to speed up the process of Cloud rev...
Linux, Material de hacking y noticias
https://doar-e.github.io/blog/2021/04/15/reverse-engineering-tcpipsys-mechanics-of-a-packet-of-the-death-cve-2021-24086/
doar-e.github.io
Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086)
Linux, Material de hacking y noticias
https://defencecyberschool.thinkific.com/?ref=3bfe49
Defence Cyber School (UK)
Online Cybersecurity Training Programs
DCS offers global online cybersecurity and ethical system hacking programs and technology consultancy services in the areas of Cybersecurity, ISO27001, ISO27002, NIST, CIS Digital Transformation, Cloud Transformation and Bespoke Training Curriculum Development