استفاده از ماینرها دقیقا بعد از افشای سری اکسپلویت های #NSA توسط تیم #shadowbroker بود حالا اینکه این تیم جزوی از دولت چین هست و شواهد حاکی بر این بوده که قبل از افشا 1 سال قبلش از اکسپلویت ها روی یک سری تارگت کار میکردند نداریم.
https://gist.github.com/bontchev/e5d2e5090ebe1be89b4f821ebb1ad0f9
https://www.wired.com/story/china-nsa-hacking-tool-epme-hijack/
https://decoded.avast.io/martinchlumecky/dirtymoe-1/
https://thehackernews.com/2021/03/purple-fox-rootkit-can-now-spread.html
ولی جالبیش اینکه از سال 2016 که مصادف با افشای اطلاعات #edwardsnowden بوده هکر ها برای کسب در امد سرورهای اصطلاحا بی صاحب رو هک میکردند و روش ماینر نصب میکردند یک مدت هم ترند بود که اتوماینر میفروختند و تو همین ایران هم استفاده می شد #autominer
https://www.wired.co.uk/article/nsa-hacking-tools-stolen-hackers
ولی شیوه ای که تیم چینی استفاده کرده برای ماین کردن بیش از 2 میلیون دلار واقعا جذابه !
حالا اومدن چی کار کردن اومدن Windows Defender طراحی کردند جایگزین کردن به عنوان سرویس تو ویندوز جدا از خلاف بودن ذهن خلاقی دارند هکرهای چینی
https://www.pcrisk.com/removal-guides/15093-msascuil-exe-virus
علاوه بر ماین کردن در سرورها در سرتاسر دنیا اطلاعات بانکی پسوردها رو سرقت میکردند و اینطوری تعداد زیادی VPS برای ماین به دامنه کاریشون اضافه می شده.
https://thehackernews.com/2021/06/crackonosh-virus-mined-2-million-of.html
"Crackonosh shows the risks in downloading cracked software," Avast security researcher Daniel Beneš said. "As long as people continue to download cracked software, attacks like these will continue and continue to be profitable for attackers. The key take-away from this is that you really can't get something for nothing and when you try to steal software, odds are someone is trying to steal from you."
لطفا #splunk #kerio کرک شده نصب نکنید !
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
https://gist.github.com/bontchev/e5d2e5090ebe1be89b4f821ebb1ad0f9
https://www.wired.com/story/china-nsa-hacking-tool-epme-hijack/
https://decoded.avast.io/martinchlumecky/dirtymoe-1/
https://thehackernews.com/2021/03/purple-fox-rootkit-can-now-spread.html
ولی جالبیش اینکه از سال 2016 که مصادف با افشای اطلاعات #edwardsnowden بوده هکر ها برای کسب در امد سرورهای اصطلاحا بی صاحب رو هک میکردند و روش ماینر نصب میکردند یک مدت هم ترند بود که اتوماینر میفروختند و تو همین ایران هم استفاده می شد #autominer
https://www.wired.co.uk/article/nsa-hacking-tools-stolen-hackers
ولی شیوه ای که تیم چینی استفاده کرده برای ماین کردن بیش از 2 میلیون دلار واقعا جذابه !
حالا اومدن چی کار کردن اومدن Windows Defender طراحی کردند جایگزین کردن به عنوان سرویس تو ویندوز جدا از خلاف بودن ذهن خلاقی دارند هکرهای چینی
https://www.pcrisk.com/removal-guides/15093-msascuil-exe-virus
علاوه بر ماین کردن در سرورها در سرتاسر دنیا اطلاعات بانکی پسوردها رو سرقت میکردند و اینطوری تعداد زیادی VPS برای ماین به دامنه کاریشون اضافه می شده.
https://thehackernews.com/2021/06/crackonosh-virus-mined-2-million-of.html
"Crackonosh shows the risks in downloading cracked software," Avast security researcher Daniel Beneš said. "As long as people continue to download cracked software, attacks like these will continue and continue to be profitable for attackers. The key take-away from this is that you really can't get something for nothing and when you try to steal software, odds are someone is trying to steal from you."
لطفا #splunk #kerio کرک شده نصب نکنید !
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
Gist
Curated list of links describing the leaked Equation Group tools for Windows
Curated list of links describing the leaked Equation Group tools for Windows - EQgroup.md
With the shift in focus from CentOS project to CentOS Stream which will now serve as the upstream to RHEL, a few CentOS alternatives have been floated to replace CentOS 8.
EOL
https://wiki.centos.org/About/Product
گزینه های جایگزین
https://www.tecmint.com/migrate-from-centos-to-oracle-linux/
https://www.oracle.com/linux/technologies/oracle-linux-downloads.html
https://www.sonarqube.org/downloads/
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
EOL
https://wiki.centos.org/About/Product
گزینه های جایگزین
https://www.tecmint.com/migrate-from-centos-to-oracle-linux/
https://www.oracle.com/linux/technologies/oracle-linux-downloads.html
https://www.sonarqube.org/downloads/
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
کتاب هایی که دیشب در Clubhouse معرفی شده اند منابع بسیار خوبی هستند مخصوصا RTFM فقط کامندها و سوییچ های مورد نیاز در مراحل مختلف تست نفوذ به ریز گفته
#redTeam
#blueTeam
#RTFM
#BTFM
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
#redTeam
#blueTeam
#RTFM
#BTFM
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
Peneter.com
Penetration Tester
SoheilSec
Playing with MITRE for SIEM Detection Rules https://www.linkedin.com/feed/update/urn%3Ali%3Aactivity%3A6812838798569959424/ #blueteam $SIEM #mitre 🌐 Peneter BLog 🔊 Clubhouse 🔊 Telegram Channel
What is Detection-Rule-Dump ?l
https://github.com/archanchoudhury/Detection-Rule-Dump
https://www.youtube.com/c/BlackPerl
#DFIR
#SIEM
#SOC
https://github.com/archanchoudhury/Detection-Rule-Dump
https://www.youtube.com/c/BlackPerl
#DFIR
#SIEM
#SOC
GitHub
GitHub - archanchoudhury/Detection-Rule-Dump: This is the One Stop place where you can several Detection Rules which can help you…
This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work. - archanchoudhury/Detection-Rule-Dump
https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-asaftd-xss-multiple-FCB3vPZe.html
https://www.tenable.com/blog/cve-2020-3580-proof-of-concept-published-for-cisco-asa-flaw-patched-in-october
https://www.tenable.com/blog/cve-2020-3580-proof-of-concept-published-for-cisco-asa-flaw-patched-in-october
Cisco
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities
Update June 28, 2021: Cisco has become aware that public exploit code exists for CVE-2020-3580, and this vulnerability is being actively exploited.
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software…
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software…
1)Microsoft on Friday said it's investigating an incident wherein a driver signed by the company turned out to be a malicious Windows rootkit that was observed communicating with command-and-control (C2) servers located in China.
https://thehackernews.com/2021/06/hackers-trick-microsoft-into-signing.html
https://www.virustotal.com/gui/file/63d61549030fcf46ff1dc138122580b4364f0fe99e6b068bc6a3d6903656aff0/detection
https://msrc-blog.microsoft.com/2021/06/25/investigating-and-mitigating-malicious-drivers/
2)Social Engineering with Spam result will be ransomware entire network
https://thehackernews.com/2021/06/dmarc-first-line-of-defense-against.html
مهندسی اجتماعی چیست و روش های آن :
https://blog.peneter.com/clubhouse-general-social-engineering-1/
https://blog.peneter.com/clubhouse-general-social-engineering-2-phishing/
https://blog.peneter.com/clubhouse-general-social-engineering-3-malware/
برای بررسی اینکه Domain در بلک لیست قرار دارد یا نه
https://powerdmarc.com/analyzer/
https://mxtoolbox.com/
3)SolarWinds Hackers Breach Microsoft Customer Support to Target its Customers
APT های این چند وقت اخیر
It's tracked by the wider cybersecurity community under the monikers APT29, UNC2452 (FireEye), SolarStorm (Unit 42), StellarParticle (Crowdstrike), Dark Halo (Volexity), and Iron Ritual (Secureworks).
https://thehackernews.com/2021/06/solarwinds-hackers-breach-microsoft.html
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
https://thehackernews.com/2021/06/hackers-trick-microsoft-into-signing.html
https://www.virustotal.com/gui/file/63d61549030fcf46ff1dc138122580b4364f0fe99e6b068bc6a3d6903656aff0/detection
https://msrc-blog.microsoft.com/2021/06/25/investigating-and-mitigating-malicious-drivers/
2)Social Engineering with Spam result will be ransomware entire network
https://thehackernews.com/2021/06/dmarc-first-line-of-defense-against.html
مهندسی اجتماعی چیست و روش های آن :
https://blog.peneter.com/clubhouse-general-social-engineering-1/
https://blog.peneter.com/clubhouse-general-social-engineering-2-phishing/
https://blog.peneter.com/clubhouse-general-social-engineering-3-malware/
برای بررسی اینکه Domain در بلک لیست قرار دارد یا نه
https://powerdmarc.com/analyzer/
https://mxtoolbox.com/
3)SolarWinds Hackers Breach Microsoft Customer Support to Target its Customers
APT های این چند وقت اخیر
It's tracked by the wider cybersecurity community under the monikers APT29, UNC2452 (FireEye), SolarStorm (Unit 42), StellarParticle (Crowdstrike), Dark Halo (Volexity), and Iron Ritual (Secureworks).
https://thehackernews.com/2021/06/solarwinds-hackers-breach-microsoft.html
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
The Hacker News
Hackers Trick Microsoft Into Signing Netfilter Driver Loaded With Rootkit Malware
Hackers tricked Microsoft into digitally signing a malicious "Netfilter" driver linked to a Windows rootkit malware.
universal cross-site scripting (UXSS) issue that's triggered when automatically translating web pages using the browser's built-in feature via Microsoft Translator.
اگر از Edge استفاده میکنید حتما اپدیتش کنید چون خیلی ها کار صرافی می کنند با VPS از Edge استفاده می کنند !
روش آپدیت
edge://settings/help
رو تو آدرس بار بزنید آخرین ورژن نبود بزنین آپدیت بشه
https://thehackernews.com/2021/06/microsoft-edge-bug-couldve-let-hackers.html
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
اگر از Edge استفاده میکنید حتما اپدیتش کنید چون خیلی ها کار صرافی می کنند با VPS از Edge استفاده می کنند !
روش آپدیت
edge://settings/help
رو تو آدرس بار بزنید آخرین ورژن نبود بزنین آپدیت بشه
https://thehackernews.com/2021/06/microsoft-edge-bug-couldve-let-hackers.html
🌐 Peneter BLog
🔊 Clubhouse
🔊 Telegram Channel
The Hacker News
Microsoft Edge Bug Could've Let Hackers Steal Your Secrets for Any Site
Hackers could have stolen your secrets for any site through a Microsoft Edge bug
SoheilSec
Pentest Steps.xmind
نسخه فارسی Penetration Testing Mind
Credit : Hamid Kashfi
Credit : Hamid Kashfi
My old Template 2016 (information Gathering).xmind
4.4 MB
Information Gathering Xmind
Credit : Soheil Hashemi
Good for Penetration Testing Report
Credit : Soheil Hashemi
Good for Penetration Testing Report
project-Vul Assessment mind-94.0.0.xmind
4.1 MB
Vulnerability Assessments Part
Credit : soheil Hashemi
Credit : soheil Hashemi
Data for 700M #LinkedIn Users Posted for Sale in #Raidforums
https://threatpost.com/data-700m-linkedin-users-cyber-underground/167362/?utm_source=dlvr.it&utm_medium=linkedin
https://raidforums.com/Thread-SELLING-New-Linkedin-2021-700Million-records?highlight=linkedin
https://threatpost.com/data-700m-linkedin-users-cyber-underground/167362/?utm_source=dlvr.it&utm_medium=linkedin
https://raidforums.com/Thread-SELLING-New-Linkedin-2021-700Million-records?highlight=linkedin
Threat Post
Data for 700M LinkedIn Users Posted for Sale in Cyber-Underground
After 500 million LinkedIn enthusiasts were affected in a data-scraping incident in April, it's happened again - with big security ramifications.
Disclosure of a bug in Adobe’s content-management solution – used by Mastercard, LinkedIn and PlayStation – were released.
https://threatpost.com/rce-bug-in-adobe-revealed/167382/
#adobe
#0day
https://threatpost.com/rce-bug-in-adobe-revealed/167382/
#adobe
#0day
Threat Post
Details of RCE Bug in Adobe Experience Manager Revealed
Disclosure of a bug in Adobe’s content-management solution - used by Mastercard, LinkedIn and PlayStation – were released.
CVE-2021-35523: Local Privilege Escalation in Securepoint SSL VPN Client 2.0.30
https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/
https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent
https://github.com/irsl/gcp-dhcp-takeover-code-exec
#googlecloud
#takeover
https://github.com/irsl/gcp-dhcp-takeover-code-exec
#googlecloud
#takeover
GitHub
GitHub - irsl/gcp-dhcp-takeover-code-exec: Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting…
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent - irsl/gcp-dhcp-takeover-code-exec
CVE-2020-1170 - Microsoft Windows Defender Elevation of Privilege Vulnerability
CVE-2020-1170, an elevation of privilege bug in Windows Defender
https://itm4n.github.io/cve-2020-1170-windows-defender-eop/
CVE-2020-1170, an elevation of privilege bug in Windows Defender
https://itm4n.github.io/cve-2020-1170-windows-defender-eop/
itm4n’s blog
CVE-2020-1170 - Microsoft Windows Defender Elevation of Privilege Vulnerability
Here is my writeup about CVE-2020-1170, an elevation of privilege bug in Windows Defender. Finding a vulnerability in a security-oriented product is quite satisfying. Though, there was nothing groundbreaking. It’s quite the opposite actually and I’m surprised…