Trend Microโs Fyodor Yarochkin, Zhengyu Dong & Paul Pajares present an overview of the Lemon Groupโs use of pre-infected mobile devices and how this scheme is potentially being developed and expanded to other IoT devices. https://www.trendmicro.com/en_us/research/23/e/lemon-group-cybercriminal-businesses-built-on-preinfected-devices.html
๐ฃvirusbtn
๐@malwr
๐ฃvirusbtn
๐@malwr
Excellent series by @LordNoteworthy explaining how virtualization on x86 works
Intro to Virtualization: https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/
VMWare and Full Virtualization using Binary Translation: https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/
Xen and Paravirtualization: https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/
QEMU: https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu/
#virtualization #hacking #infotech #infosec #learning
๐ฃ0xor0ne
๐@malwr
Intro to Virtualization: https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/
VMWare and Full Virtualization using Binary Translation: https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/
Xen and Paravirtualization: https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/
QEMU: https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu/
#virtualization #hacking #infotech #infosec #learning
๐ฃ0xor0ne
๐@malwr
๐2โค1
It has shipped - #ILSpy 8 is here with record structs, required members & more language features, plus - yes - more themes! https://github.com/icsharpcode/ILSpy/releases/tag/v8.0
๐ฃilspy
๐@malwr
๐ฃilspy
๐@malwr
โค1๐1
MITRE ATT&CKยฎ- ICS Matrix
Source: MITRE ATT&CKยฎ
Available for download in Press Quality:
https://cyberstartupobservatory.com/cyber-security-frameworks/
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
๐ฃJMonteagudoE
๐@malwr
Source: MITRE ATT&CKยฎ
Available for download in Press Quality:
https://cyberstartupobservatory.com/cyber-security-frameworks/
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
๐ฃJMonteagudoE
๐@malwr
Study Network+ for FREE
โข Network+ Video Series: https://youtube.com/playlist?list=PLG49S3nxzAnlCJiCrOYuRYb6cne864a7G
โข Network+ Study Guide: https://howtonetwork.com/comptia-network-study-guide-free/
โข Network+ Practice Test: https://gocertify.com/quizzes/network-plus-practice-quizzes
โข Network+ Practice Labs: https://gocertify.com/labs/network-plus-practice-labs
โข Network+ Cheat Sheet: https://tutorialsweb.com/CertNotes/CompTIA-cert/Network+/netplus-1.htm
๐ฃBowTiedCyber
๐@malwr
โข Network+ Video Series: https://youtube.com/playlist?list=PLG49S3nxzAnlCJiCrOYuRYb6cne864a7G
โข Network+ Study Guide: https://howtonetwork.com/comptia-network-study-guide-free/
โข Network+ Practice Test: https://gocertify.com/quizzes/network-plus-practice-quizzes
โข Network+ Practice Labs: https://gocertify.com/labs/network-plus-practice-labs
โข Network+ Cheat Sheet: https://tutorialsweb.com/CertNotes/CompTIA-cert/Network+/netplus-1.htm
๐ฃBowTiedCyber
๐@malwr
CBT IT Certification Training
CompTIA Network+ Study Guide - Free - howtonetwork.com
Use our Free CompTIA Network+ study guide to prepare for your exam. Learn IP subnetting, virtualization, DHCP, wireless, troubleshooting and more.
Search more than 60000 undocumented Windows Kernel structures
https://www.vergiliusproject.com/
๐ฃsecurityfreax
๐@malwr
https://www.vergiliusproject.com/
๐ฃsecurityfreax
๐@malwr
Vergiliusproject
Vergilius Project
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures.
โค1
Phishing Analysis: Decrypting HTTPS traffic with Wireshark
๐ฃstra1ghtarrow
How would this work if GPS spoofing was used?
๐คPoofing_SME
As others have stated, using a dedicated MITM tool for ssl interception is faster and more efficient than using Wireshark. (It's also an industry expectation).
That being said it is still overall a fairly well written article. The only constructive criticism I'll give is this line comes off as condescending towards your wife and self congratulatory...
"Thanks to the regular user awareness sessions I have conducted with her (lol), she did the right thing and forwarded the email to me."
As technical writing is subject to a more formalized style in general this type of language I find unacceptable and off putting and using "lol" here was unnecessary.
I urge you though to continue your technical writing and journey into cybersec as you clearly have passion. Cheers.
๐คTaikor
Why did you create an SSLKeylog file to decrypt traffic when you can see right in the payload section of the developer tools what is being passed and what IP its being passed to?
I feel like you took extra steps for a rather simple phishing tactic.
๐คSwitchInteresting718
๐@malwr
๐ฃstra1ghtarrow
How would this work if GPS spoofing was used?
๐คPoofing_SME
As others have stated, using a dedicated MITM tool for ssl interception is faster and more efficient than using Wireshark. (It's also an industry expectation).
That being said it is still overall a fairly well written article. The only constructive criticism I'll give is this line comes off as condescending towards your wife and self congratulatory...
"Thanks to the regular user awareness sessions I have conducted with her (lol), she did the right thing and forwarded the email to me."
As technical writing is subject to a more formalized style in general this type of language I find unacceptable and off putting and using "lol" here was unnecessary.
I urge you though to continue your technical writing and journey into cybersec as you clearly have passion. Cheers.
๐คTaikor
Why did you create an SSLKeylog file to decrypt traffic when you can see right in the payload section of the developer tools what is being passed and what IP its being passed to?
I feel like you took extra steps for a rather simple phishing tactic.
๐คSwitchInteresting718
๐@malwr
Medium
Phishing Analysis: Decrypting HTTPS traffic with Wireshark
Last week, my wife received an email requesting her to return a certificate of insurance. We have had regular discussions around personalโฆ
Lazarus Group Targeting Windows IIS Web Servers
๐ฃdigicat
I have been seeing a couple instances of similar attacks through misconfigured IIS Servers where services have been taken over and used to load malicious payloads into incomings RDS via VPN sessions via service accounts over the past couple of weeks.
When I traced the attacks I found them all to be coming out of Russia. Neither here nor there, but was able to reconfigure firewalls, close ports on IIS, and mitigate.
๐คRatherB_fishing
๐@malwr
๐ฃdigicat
I have been seeing a couple instances of similar attacks through misconfigured IIS Servers where services have been taken over and used to load malicious payloads into incomings RDS via VPN sessions via service accounts over the past couple of weeks.
When I traced the attacks I found them all to be coming out of Russia. Neither here nor there, but was able to reconfigure firewalls, close ports on IIS, and mitigate.
๐คRatherB_fishing
๐@malwr
ASEC
Lazarus Group Targeting Windows IIS Web Servers - ASEC
Lazarus Group Targeting Windows IIS Web Servers ASEC
A Modern Approach to Evading AntiVirus and Bypassing Endpoint Detection
๐ฃResidentHacker
Learnt new stuff, thanks and cool stuff for AV evasion
๐คKa4maroot
If you look at the git, Bypassing Endpoint Detection is a bit of a misnomer here. This is AV evasion + living off the land. Nice resource for a few evasion techniques though!
๐คSittadel
๐@malwr
๐ฃResidentHacker
Learnt new stuff, thanks and cool stuff for AV evasion
๐คKa4maroot
If you look at the git, Bypassing Endpoint Detection is a bit of a misnomer here. This is AV evasion + living off the land. Nice resource for a few evasion techniques though!
๐คSittadel
๐@malwr
GitHub
GitHub - RoseSecurity/Anti-Virus-Evading-Payloads: During the exploitation phase of a pen test or ethical hacking engagement, youโฆ
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus ...
librick/ic1101: Reverse engineering of a 2021 Honda Civic headunit
๐ฃtnavda
I've been curious if the LKAS stuff is contained within one of the APKs, or if that software is located elsewhere. There is a hard-coded 45MPH minimum to activate LKAS, but that always seemed pretty arbitrary to me, and I wonder if one could modify that and see what happens.
๐คebol4anthr4x
๐@malwr
๐ฃtnavda
I've been curious if the LKAS stuff is contained within one of the APKs, or if that software is located elsewhere. There is a hard-coded 45MPH minimum to activate LKAS, but that always seemed pretty arbitrary to me, and I wonder if one could modify that and see what happens.
๐คebol4anthr4x
๐@malwr
GitHub
GitHub - librick/ic1101: Reverse engineering and hacking 10th generation Honda Civic headunits
Reverse engineering and hacking 10th generation Honda Civic headunits - librick/ic1101
Ransomware Notes
This is a collection of various #ransomware notes from the past to the present.
https://github.com/threatlabz/ransomware_notes
#cybersecurity #infosec
https://t.me/hackgit/8819
๐ฃhack_git
๐@malwr
This is a collection of various #ransomware notes from the past to the present.
https://github.com/threatlabz/ransomware_notes
#cybersecurity #infosec
https://t.me/hackgit/8819
๐ฃhack_git
๐@malwr
Microsoft Threat Intelligence researchers share information on the Volt Typhoon state-sponsored actor, its campaign targeting critical infrastructure providers, & its tactics for achieving and maintaining unauthorized access to target networks. https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
๐ฃvirusbtn
๐@malwr
๐ฃvirusbtn
๐@malwr
ESET's Lukas Stefanko describes a new Android RAT based on AhMyth. AhRat's specific malicious behaviour, which involves extracting microphone recordings & stealing files with specific extensions, potentially indicates involvement in an espionage campaign. https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/
๐ฃvirusbtn
๐@malwr
๐ฃvirusbtn
๐@malwr
The DFIR Report's researchers look into an incident that started with the execution of IcedID malware contained within an Excel document delivered to the victim as part of a malspam campaign. https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomware/
๐ฃvirusbtn
๐@malwr
๐ฃvirusbtn
๐@malwr