Compsci Library πŸ“š
225 subscribers
13 photos
86 files
434 links
Resource about my compsci study, random topic related mostly about system, compiler and programing language.
Download Telegram
Forwarded from vx-underground
Let's talk about ransomware for a second.

Ransomware Threat Actors are opportunity driven. They do not have specific targets in mind. If you've got a dollar, they want it.

The reality of the matter, in the ransomware ecosystem, is initial access brokering is cheap and affordable, it is a worthwhile investment for ransomware affiliates to establish a good relationship with an initial access broker.

There is an initial access broker who will sell you roughly 1,000,000 misconfigured VPN's for $1,500. These 'misconfigured' VPNs typically will be companies which have accidentally set a VPN user login to something like 'test' as the username AND password. Although this may sound absurd, or unlikely, these are extremely common as companies may simply overlook small errors. However, these misconfigured VPNs are not curated. Ransomware affiliates might have to spend weeks, or months, sorting through the list determining which companies discovered have:

1. Money
2. Do not violate the rules of the ransomware group
3. Have insufficient security posture
4. Are outside with CIS (ex-soviet countries).

This is often how ransomware groups collide with each other. Two different initial access brokers may have identified (or gotten access) to the exact same organization and then sold this identified vulnerable organization, or access, to two different ransomware groups. There have been stories where ransomware affiliates gain access, only to discover upon entry the organization has already been ransomed!

Companies that have correctly configured EDRs (a detected blue team), a SOC, and have good policy and/or asset control will defeat most ransomware affiliates. More often than not, if an affiliate encounters a company that has a good EDR, or hardened machines, they may simply abandon the target all together (or sell it to a different ransomware operator) because it may not be worth their time. Metaphorically speaking, time is money to the Ransomware Threat Actor.

Regarding targets, there is another aspect often overlooked. Ransomware operators residing outside NATO often do not understand the culture or targets they have identified. For example, we have witnessed ransomware groups target public school systems, failing to understand how the United States allocates money for schools. They mistakenly believe tax-funded schools are ripe with cash and simply do not believe negotiators when they say the victim doesn't have the money. They rely on publicly available information (often wrong information) from places like Wikipedia or ZoomInfo. They see big numbers and believe that this is the profit margins.

tl;dr if you very seriously want to defeat ransomware, security companies need to understand the financial limitations many organizations face. They do not have the money, or man power, larger companies have to combat an ever evolving threat landscape.

NOTE: There are some caveats to this rant. Every ransomware affiliate will seek different avenues of gaining access. Blah, blah, blah.

Thanks for reading. Have a goodnight (or morning).
Computer Science from the Bottom Up  https://www.bottomupcs.com/
πŸ‘1
Malware Development Course

Note: if you not want install VS, you could use w64devkit to grasp Windows API with gcc.
magnet:?xt=urn:btih:74c93b4fedb93786528944d3ae91a8da6496e5fc&dn=Sektor7+-+RED+TEAM+Operator&tr=udp://tracker.openbittorrent.com:80&tr=udp://tracker.opentrackr.org:1337/announce
⚑2
Compsci Library πŸ“š
BBv3.pdf
I made an implementation C2 based on this book, still prototype anyway. The main concept like message broker, in my opinion. I use Laravel for fast prototyping and for cheap shared hosting. Maybe in future, I like rewrite to performant language after the feature quite stable, maybe elixir or go with htmx still cant decide for now.

Enjoy, if you find interesting, please consider leave a star UwU

https://github.com/norabellm/providence-app
The Architecture of Open Source Applications (Volume 1)
LLVM

Chris Lattner

https://aosabook.org/en/v1/llvm.html
How_Cybersecurity_Really_Works_A_Hands_On_Guide_for_Total_Beginners.pdf
15.4 MB
How Cybersecurity Really Works : A Hands On Guide for Total Beginners

Great book to grasp what is and is not Cybersecurity. If you have access, quite interest and money, I suggest to buy the physical book.
❀‍πŸ”₯2
Forwarded from vx-underground
Hello, how are you?

After almost 1 year of work our second zine is complete. We are happy to announce the release of Black Mass Volume II.

The PDF is free. Physical copies will be available worldwide for purchase in the next 24 - 72 hours.

Free PDF: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
πŸ‘1
Like Lolbins but for Trusted Site

https://lots-project.com/
Windows Exploit Writing Tutorial by Corelan Security Research

01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/

03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/

03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/

04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/

05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/

06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/

07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/

08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/

09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/

10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/

11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
Reversing - Secrets Of Reverse Engineering (2005).pdf
8.5 MB
Reversing : Secret of Reverse Engineering
Eldad Eliam