Sec. Forge Hub
1.02K subscribers
56 photos
11 files
36 links
Security tools, automation, and insights - from pocket helpers to CI/CD integrations.
Built for red teamers, security engineers, and everyone shaping cyber defense.
Download Telegram
๐Ÿณ Docker - How It Works ๐Ÿณ

Docker is a containerization platform that lets you package your app and all its dependencies into lightweight, portable containers.

Each container runs on the same Docker Engine, sharing the OS kernel but staying completely isolated - with its own filesystem, processes, and network.

๐Ÿ”น Core Components:

๐Ÿงฉ Image - a blueprint containing code, libraries, and configs.
๐Ÿ“ฆ Container - a running instance of that image.
โš™๏ธ Docker Engine - runs and manages containers.
โ˜๏ธ Docker Hub - the global registry for sharing images.

๐Ÿ’ก Philosophy:


โ€œIf it works on my machine - it works everywhere.โ€

#docker #containerization
๐Ÿ”ฅ3
Docker Security - Quick Guide ๐Ÿ”’

Keeping your containers secure means minimizing attack surface, scanning for vulnerabilities, and enforcing runtime policies.

๐Ÿ”ง Essential Practices:

๐Ÿ”ธ Run container as non-root
docker run --user 1000:1000 nginx:latest


๐Ÿ”ธ Scan Docker image for vulnerabilities
docker scan myimage:latest


๐Ÿ”ธ Apply default seccomp security profile
docker run --security-opt seccomp=default.json myimage


๐Ÿงฐ Top 3 Docker Security Tools:

Trivy
๐Ÿ”น All-in-one vulnerability scanner for container images, OS packages, and IaC.

Docker Bench for Security
๐Ÿ”น Automated script to check for common Docker security best practices.

Cosign
๐Ÿ”น Tool for signing and verifying container images to ensure integrity and trust:

Key takeaway:
๐Ÿ‘‰ Always scan, sign, and sandbox - secure containers start with secure images.

#docker #containerization #security
๐Ÿ‘3๐Ÿ”ฅ1
โš ๏ธ CVE-2025-24813 Apache Tomcat as Actively Exploited with 9.8 CVSS โš ๏ธ

๐Ÿ”ฅ PoC: https://github.com/brs6412/CVE-2025-24813

๐ŸŽฏ 6.7m+ Results are found on the https://en.fofa.info nearly year.

๐Ÿ”— FOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJBUEFDSEUtVG9tY2F0Ig%3D%3D

FOFA Query:app="APACHE-Tomcat"

๐Ÿ”– Refer: https://securityonline.info/cisa-flags-apache-tomcat-cve-2025-24813-as-actively-exploited-with-9-8-cvss/

#OSINT #FOFA #CyberSecurity #Vulnerability
๐Ÿ”ฅ3
๐Ÿšจ CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. ๐Ÿšจ

Search by vul.cve Filter: ๐Ÿ‘‰ vul.cve="CVE-2025-22167"
ZoomEye Dork: ๐Ÿ‘‰ app="Atlassian JIRA"
Over 107k vulnerable instances.
ZoomEye Link: Here

Refer:
1. https://jira.atlassian.com/browse/JSDSERVER-16409
2. https://hub.zoomeye.ai/detail/68f99417ad32f0b8765c0a99

#ZoomEye #cybersecurity #infosec #OSINT
๐Ÿ”ฅ2
The best way to learn Web Cache Deception is through this learning path. ๐Ÿ‘‡

You'll learn to spot discrepancies in how origin servers and caches handle requests and then leverage these differences to create path confusion.

You'll learn:

๐Ÿ”ถ Identifying web caches
๐Ÿ”ถ How to construct a web cache deception attack
๐Ÿ”ถ How to exploit cache rules
๐Ÿ”ถ Leveraging path mapping and delimiter discrepancies
๐Ÿ”ถ Preventing web cache deception vulnerabilities

Get Started: ๐Ÿ‘‰ Here
๐Ÿ‘1๐Ÿ”ฅ1
โ˜ ๏ธ Web Cache Poisoning โ˜ ๏ธ - is an attack where a hacker manipulates HTTP requests to store malicious or incorrect content in a web cache or CDN.

๐Ÿ‘‰ As a result, all users who later access the cached page receive the poisoned version, potentially leading to mass XSS, phishing, or content manipulation.

๐Ÿ‘‰ Read more about: Here
โœ1โค1
๐Ÿค– Prompt Injection Methodology for GenAI Application Pentesting ๐Ÿค–

๐Ÿ‘‰ Get Started: Here

#AI #Pentest #Red_Team
โค2
๐Ÿ› ๏ธ SSH Tunnels: Port Forwarding on Steroids ๐Ÿ› ๏ธ

๐Ÿ”ธ A short Cheat Sheet to help you understand SSH tunneling.

#ssh_tunneling #pentest #red_team
โค1โœ1
โ›” Microsoft: DNS outage impacts Azure and Microsoft 365 services โ›”

Microsoft is suffering an ongoing DNS outage affecting customers worldwide, preventing them from logging into company networks and accessing Microsoft Azure and Microsoft 365 services.
โค1๐Ÿ˜ฑ1
โ˜ ๏ธ Evading Elastic Security - Deep dive into bypassing detections through string obfuscation, symbol randomization, XOR-encoded fragments & behavioral evasion techniques. โ˜ ๏ธ

Here ๐Ÿ‘‰ https://matheuzsecurity.github.io/hacking/bypassing-elastic

#infosec #redteam #linux #rootkit #elastic #malware
๐Ÿ”ฅ2
๐Ÿงจ The Top 10 Most Dangerous Web3 Vulnerabilities Right Now ๐Ÿงจ

๐Ÿ”ธ Access Control Vulnerabilities
๐Ÿ”ธ Price Oracle Manipulation
๐Ÿ”ธ Logic Errors
๐Ÿ”ธ Lack of Input Validation
๐Ÿ”ธ Reentrancy Attacks
๐Ÿ”ธ Unchecked External Calls
๐Ÿ”ธ Flash Loan Attacks
๐Ÿ”ธ Integer Overflow and Underflow
๐Ÿ”ธ Insecure Randomness
๐Ÿ”ธ Denial of Service (DoS) Attacks

Details: ๐Ÿ‘‰ Here
๐Ÿ’ฏ2๐Ÿคก1
โš ๏ธ How To Secure A Linux Server. โš ๏ธ

This guides purpose is to teach you how to secure a Linux server.
There are a lot of things you can do to secure a Linux server and this guide will attempt to cover as many of them as possible.

๐Ÿ‘‰ Read more - Here ๐Ÿ‘ˆ

#info_sec #linux #hardening
๐Ÿ‘2
Top virtual machines for Cybersecurity Engineers.

#info_sec #Red_Team #pentest_OS
โœ3
Host-Pulse - a fast, lightweight domain liveness probe for pentesters and security engineers.

Scans large domain lists, quickly skips dead targets, detects reachable hosts (including 403/401/5xx), and produces clean alive.txt and compact results.csv reports.

Tool: ๐Ÿ‘‰ https://github.com/xV4nd3Rx/Host-Pulse

โšก Fast-skip dead targets.
๐ŸŽฏ Alive logic tuned for pentesting
๐Ÿงฉ Randomized User-Agent per request to avoid simple UA-based filtering.
๐Ÿ” Parallel workers + controlled delays
๐Ÿ” Insecure HTTPS requests are supported (suppressed warnings) so scanning continues even with untrusted certs

#pentest_tools #Red_Team #cybersecurity #Passive_Recon
๐Ÿ”ฅ2
๐Ÿ‘‰ I believe the Telegram channel should bring real value to subscribers. ๐Ÿ‘ˆ

๐Ÿ’ฅ New column for Monday: Job Offers. ๐Ÿ’ฅ

As a Senior Security Engineer, become part of a cross-functional development team engineering experiences of tomorrow. We are seeking a highly skilled and motivated Senior Security & Penetration Tester.

In this role, you will be responsible for identifying and mitigating security vulnerabilities in a project in the biomedicine field. You will proactively test our applications, including infrastructure, ensuring our digital assets are secure against emerging threats.


๐Ÿ’ฌ For details, please contact me via direct: @V4nd3R ๐Ÿ’ฌ

#cybersecurity_career #job_offers #security
โœ2
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ› ๏ธ How digital signatures works? ๐Ÿ› ๏ธ

#info_security #cryptography #integrity
๐Ÿ”ฅ2๐Ÿค1
C2 techniques used by hackers.

#ThreatHunting #DFIR #SOC
โค1๐Ÿ‘1
๐Ÿ”ฅ SPF Attacks: Quick Overview

1๏ธโƒฃ Alignment Bypass
SPF checks MAIL FROM, not the visible From - easy spoofing.

2๏ธโƒฃ SoftFail Abuse
~all / ?all often deliver anyway.

3๏ธโƒฃ Lookalike Domains
Fake domains with valid SPF look legit.

4๏ธโƒฃ DNS Poisoning (no DNSSEC)
SPF TXT records can be spoofed.

5๏ธโƒฃ Macro Abuse
Macros leak info or behave unpredictably.

6๏ธโƒฃ Oversized SPF
>10 lookups โ†’ PermError โ†’ sometimes treated as pass.

7๏ธโƒฃ Subdomain Takeover / Abuse
Forgotten subdomains with weak policies.

8๏ธโƒฃ Trusted Sender Hijack
Compromised authorized mail services = SPF pass.

๐Ÿ’ก Takeaway

SPF alone is weak. Use DKIM + DMARC enforcement.
๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿšจ 110+ Splunk Queries for SOC Analysts โšก

Collection of real-world detection queries a goldmine for SOC analysts, threat hunters, and blue teamers.

#SOC #Blue_Team #security
๐Ÿ”ฅ4