GeekCode
797 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
😈 50 Methods For Lsass Dump.

Without going too deep into theory, Local Security Authority Subsystem Service (also known as LSASS) is a process (executable file C:\Windows\System32\lsass.exe) responsible for managing various authentication subsystems of the #Windows OS. Among his tasks: checking the β€œcreds” of local and domain accounts during various scenarios of requesting access to the system, generating security tokens for active user sessions, working with Security Support Providers (SSP), etc.


This article introduces 50 methods for extracting authentication data from LSASS memory:

https://redteamrecipe.com/50-methods-for-lsass-dumprtc0002

#Pentest #AD

@geekcode πŸ•΅οΈβ€β™‚οΈ
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
CrowdStrike's recent update has led to major disruptions for businesses worldwide, causing Windows workstations to crash.

This incident affects businesses across various sectors, from airlines to hospitals.

Read : https://thehackernews.com/2024/07/faulty-crowdstrike-update-crashes.html

@cyberagents
😈 0day in Telegram: how one click can compromise your device

ESET researchers have discovered a zero-day exploit targeting Telegram for Android. An exploit called EvilVideo appeared for sale on an underground forum on June 6, 2024. Attackers used this vulnerability to distribute malicious files through Telegram channels, groups and chats, disguising them as multimedia files.

β€” The vulnerability allowed sending malicious files that looked like videos in unprotected versions of Telegram for Android (10.14.4 and older). The exploit was found on the XSS forum, where a seller demonstrated its work in a public Telegram channel. This allowed the researchers to obtain the malicious file and test it.


It also turned out that the seller of the exploit offered a cryptor service for Android, making malicious files invisible to antiviruses. This service has been advertised on the same XSS forum since January 2024.

#0day #Telegram

@geekcode 😈
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
🌐 Google's AI agent helped find a vulnerability in SQLite before the official update

Google Project Zero showed the results of a new approach to finding vulnerabilities in popular software using large language models (LLM). As part of the experimental project πŸ‘ "Big Sleep" πŸ€–, their AI agent was able to find a vulnerability in the SQLite DBMS, causing considerable interest among information security specialists.

The problem was discovered in πŸ‘¨β€πŸ’» stack buffer underflow in SQLite. The vulnerability was quickly fixed by the developers in October 2024 before the new update was released to the public.

@geekcode πŸ“Œ
This media is not supported in your browser
VIEW IN TELEGRAM
@geekcode πŸ“Œ
πŸ‘Ž1
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
❀1
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
UrlScanIO Chrome/Firefox Extension

A tool to quickly retrieve information about active tab URL:

- domain/IP/ASN
- domain creation date
- phishing/malware reputation

and more.

https://chromewebstore.google.com/detail/urlscanio/loehkbkhflmmkempgkdpkkhghdiegicp

@geekcode 😈
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
😈 16 billion passwords from Apple, Google, Facebook leaked online

β€” Hackers leaked 16 billion logins and passwords from Apple, Google, GitHub, Telegram, Instagram, Facebook accounts

According to experts, most of this data has not been published anywhere before, meaning the data is fresh

@cyberagents πŸ§‘β€πŸ’»
This media is not supported in your browser
VIEW IN TELEGRAM