photo_2024-07-31_08-39-43.jpg
145.9 KB
🚀 List of Bug Bounty Commands
Netgotchi - O dispositivo para detectar intrusos na sua rede
Video novo pessoal, quem puder estar deixando o like e se inscrevendo vai ajudar bastante.
https://youtu.be/eD2SduiXqIc
Video novo pessoal, quem puder estar deixando o like e se inscrevendo vai ajudar bastante.
https://youtu.be/eD2SduiXqIc
YouTube
Netgotchi - O dispositivo para detectar intrusos na sua rede
📌 Links Úteis:
NOSSO GRUPO NO TELEGRAM:
👉 https://t.me/hacking_bra
👉 Link do código do projeto:
https://github.com/MXZZ/Netgotchi
APOIE O CANAL:
👉Doe qualquer quantia e ajude a trazermos mais conteúdos.
Chave PIX: ryoonivo@protonmail.com
🅾️ REDES SOCIAIS:…
NOSSO GRUPO NO TELEGRAM:
👉 https://t.me/hacking_bra
👉 Link do código do projeto:
https://github.com/MXZZ/Netgotchi
APOIE O CANAL:
👉Doe qualquer quantia e ajude a trazermos mais conteúdos.
Chave PIX: ryoonivo@protonmail.com
🅾️ REDES SOCIAIS:…
🔥1
Exploit for Windows Kernel-Mode Driver Elevation of Privilege Flaw (CVE-2024-35250)
The vulnerability lies within the handling of property requests in the ks.sys driver. Specifically, when the KSPROPERTY_TYPE_UNSERIALIZESET flag is provided, a series of operations can be initiated that ultimately lead to arbitrary IOCTL calls. During this process, the user-supplied buffer is copied into a newly allocated space and executed without proper validation.
The vulnerability lies within the handling of property requests in the ks.sys driver. Specifically, when the KSPROPERTY_TYPE_UNSERIALIZESET flag is provided, a series of operations can be initiated that ultimately lead to arbitrary IOCTL calls. During this process, the user-supplied buffer is copied into a newly allocated space and executed without proper validation.
Cracking Windows Kernel with HEVD
🔗 Link - Part 0
🔗 Link - Part 1
🔗 Link - Part 2
🔗 Link - Part 3
🔗 Link - Part 4
🔗 Link - Part 0
🔗 Link - Part 1
🔗 Link - Part 2
🔗 Link - Part 3
🔗 Link - Part 4
Linux Malware Development:
Создание reverse shell на основе TLS/SSL на Python
*
writeUP
*
source: reverse_ssl.py
Создание reverse shell на основе TLS/SSL на Python
*
writeUP
*
source: reverse_ssl.py
Tunelamento SSH: exemplos, comando, configuração do servidor
https://www.ssh.com/academy/ssh/tunneling-example
https://www.ssh.com/academy/ssh/tunneling-example
Hiding Linux Processes with Bind Mounts
☢️ https://dfir.ch/posts/slash-proc/
☢️ https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
☢️ https://dfir.ch/posts/slash-proc/
☢️ https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
🔥🔥 SCADA/ICS Hacking and Security🔥🔥
SCADA/ICS systems are among the greatest concerns for cyber warfare/cyber defense organizations. These systems are particularly vulnerable for a number of reasons, including-- but not limited to--the fact that so many SCADA/ICS organizations have relied upon security through obscurity for so many years. These industrial control systems are critical to any nation's infrastructure and, thereby, their economy. In this section, we will be showing how these systems can be found, hacked and controlled. Link
SCADA/ICS systems are among the greatest concerns for cyber warfare/cyber defense organizations. These systems are particularly vulnerable for a number of reasons, including-- but not limited to--the fact that so many SCADA/ICS organizations have relied upon security through obscurity for so many years. These industrial control systems are critical to any nation's infrastructure and, thereby, their economy. In this section, we will be showing how these systems can be found, hacked and controlled. Link
Malware Development
*
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR Series
@hackingbra
*
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR Series
@hackingbra
👍1