Study Network+ for FREE
• Network+ Video Series: https://youtube.com/playlist?list=PLG49S3nxzAnlCJiCrOYuRYb6cne864a7G
• Network+ Study Guide: https://howtonetwork.com/comptia-network-study-guide-free/
• Network+ Practice Test: https://gocertify.com/quizzes/network-plus-practice-quizzes
• Network+ Practice Labs: https://gocertify.com/labs/network-plus-practice-labs
• Network+ Cheat Sheet: https://tutorialsweb.com/CertNotes/CompTIA-cert/Network+/netplus-1.htm
🗣BowTiedCyber
🎖@malwr
• Network+ Video Series: https://youtube.com/playlist?list=PLG49S3nxzAnlCJiCrOYuRYb6cne864a7G
• Network+ Study Guide: https://howtonetwork.com/comptia-network-study-guide-free/
• Network+ Practice Test: https://gocertify.com/quizzes/network-plus-practice-quizzes
• Network+ Practice Labs: https://gocertify.com/labs/network-plus-practice-labs
• Network+ Cheat Sheet: https://tutorialsweb.com/CertNotes/CompTIA-cert/Network+/netplus-1.htm
🗣BowTiedCyber
🎖@malwr
CBT IT Certification Training
CompTIA Network+ Study Guide - Free - howtonetwork.com
Use our Free CompTIA Network+ study guide to prepare for your exam. Learn IP subnetting, virtualization, DHCP, wireless, troubleshooting and more.
Search more than 60000 undocumented Windows Kernel structures
https://www.vergiliusproject.com/
🗣securityfreax
🎖@malwr
https://www.vergiliusproject.com/
🗣securityfreax
🎖@malwr
Vergiliusproject
Vergilius Project
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures.
❤1
Phishing Analysis: Decrypting HTTPS traffic with Wireshark
🗣stra1ghtarrow
How would this work if GPS spoofing was used?
👤Poofing_SME
As others have stated, using a dedicated MITM tool for ssl interception is faster and more efficient than using Wireshark. (It's also an industry expectation).
That being said it is still overall a fairly well written article. The only constructive criticism I'll give is this line comes off as condescending towards your wife and self congratulatory...
"Thanks to the regular user awareness sessions I have conducted with her (lol), she did the right thing and forwarded the email to me."
As technical writing is subject to a more formalized style in general this type of language I find unacceptable and off putting and using "lol" here was unnecessary.
I urge you though to continue your technical writing and journey into cybersec as you clearly have passion. Cheers.
👤Taikor
Why did you create an SSLKeylog file to decrypt traffic when you can see right in the payload section of the developer tools what is being passed and what IP its being passed to?
I feel like you took extra steps for a rather simple phishing tactic.
👤SwitchInteresting718
🎖@malwr
🗣stra1ghtarrow
How would this work if GPS spoofing was used?
👤Poofing_SME
As others have stated, using a dedicated MITM tool for ssl interception is faster and more efficient than using Wireshark. (It's also an industry expectation).
That being said it is still overall a fairly well written article. The only constructive criticism I'll give is this line comes off as condescending towards your wife and self congratulatory...
"Thanks to the regular user awareness sessions I have conducted with her (lol), she did the right thing and forwarded the email to me."
As technical writing is subject to a more formalized style in general this type of language I find unacceptable and off putting and using "lol" here was unnecessary.
I urge you though to continue your technical writing and journey into cybersec as you clearly have passion. Cheers.
👤Taikor
Why did you create an SSLKeylog file to decrypt traffic when you can see right in the payload section of the developer tools what is being passed and what IP its being passed to?
I feel like you took extra steps for a rather simple phishing tactic.
👤SwitchInteresting718
🎖@malwr
Medium
Phishing Analysis: Decrypting HTTPS traffic with Wireshark
Last week, my wife received an email requesting her to return a certificate of insurance. We have had regular discussions around personal…
Lazarus Group Targeting Windows IIS Web Servers
🗣digicat
I have been seeing a couple instances of similar attacks through misconfigured IIS Servers where services have been taken over and used to load malicious payloads into incomings RDS via VPN sessions via service accounts over the past couple of weeks.
When I traced the attacks I found them all to be coming out of Russia. Neither here nor there, but was able to reconfigure firewalls, close ports on IIS, and mitigate.
👤RatherB_fishing
🎖@malwr
🗣digicat
I have been seeing a couple instances of similar attacks through misconfigured IIS Servers where services have been taken over and used to load malicious payloads into incomings RDS via VPN sessions via service accounts over the past couple of weeks.
When I traced the attacks I found them all to be coming out of Russia. Neither here nor there, but was able to reconfigure firewalls, close ports on IIS, and mitigate.
👤RatherB_fishing
🎖@malwr
ASEC
Lazarus Group Targeting Windows IIS Web Servers - ASEC
Lazarus Group Targeting Windows IIS Web Servers ASEC
A Modern Approach to Evading AntiVirus and Bypassing Endpoint Detection
🗣ResidentHacker
Learnt new stuff, thanks and cool stuff for AV evasion
👤Ka4maroot
If you look at the git, Bypassing Endpoint Detection is a bit of a misnomer here. This is AV evasion + living off the land. Nice resource for a few evasion techniques though!
👤Sittadel
🎖@malwr
🗣ResidentHacker
Learnt new stuff, thanks and cool stuff for AV evasion
👤Ka4maroot
If you look at the git, Bypassing Endpoint Detection is a bit of a misnomer here. This is AV evasion + living off the land. Nice resource for a few evasion techniques though!
👤Sittadel
🎖@malwr
GitHub
GitHub - RoseSecurity/Anti-Virus-Evading-Payloads: During the exploitation phase of a pen test or ethical hacking engagement, you…
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus ...
librick/ic1101: Reverse engineering of a 2021 Honda Civic headunit
🗣tnavda
I've been curious if the LKAS stuff is contained within one of the APKs, or if that software is located elsewhere. There is a hard-coded 45MPH minimum to activate LKAS, but that always seemed pretty arbitrary to me, and I wonder if one could modify that and see what happens.
👤ebol4anthr4x
🎖@malwr
🗣tnavda
I've been curious if the LKAS stuff is contained within one of the APKs, or if that software is located elsewhere. There is a hard-coded 45MPH minimum to activate LKAS, but that always seemed pretty arbitrary to me, and I wonder if one could modify that and see what happens.
👤ebol4anthr4x
🎖@malwr
GitHub
GitHub - librick/ic1101: Reverse engineering and hacking 10th generation Honda Civic headunits
Reverse engineering and hacking 10th generation Honda Civic headunits - librick/ic1101
Ransomware Notes
This is a collection of various #ransomware notes from the past to the present.
https://github.com/threatlabz/ransomware_notes
#cybersecurity #infosec
https://t.me/hackgit/8819
🗣hack_git
🎖@malwr
This is a collection of various #ransomware notes from the past to the present.
https://github.com/threatlabz/ransomware_notes
#cybersecurity #infosec
https://t.me/hackgit/8819
🗣hack_git
🎖@malwr
Microsoft Threat Intelligence researchers share information on the Volt Typhoon state-sponsored actor, its campaign targeting critical infrastructure providers, & its tactics for achieving and maintaining unauthorized access to target networks. https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
🗣virusbtn
🎖@malwr
🗣virusbtn
🎖@malwr
ESET's Lukas Stefanko describes a new Android RAT based on AhMyth. AhRat's specific malicious behaviour, which involves extracting microphone recordings & stealing files with specific extensions, potentially indicates involvement in an espionage campaign. https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/
🗣virusbtn
🎖@malwr
🗣virusbtn
🎖@malwr
The DFIR Report's researchers look into an incident that started with the execution of IcedID malware contained within an Excel document delivered to the victim as part of a malspam campaign. https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomware/
🗣virusbtn
🎖@malwr
🗣virusbtn
🎖@malwr
I’m excited to kick the morning off by announcing the release of 🍎 Living Off the Orchard: macOS Binaries (LOOBins)!
https://loobins.io
You can find more details about the LOOBins project in my “Introducing LOOBins” Medium post here:
https://infosecb.medium.com/introducing-loobins-9e732b9e06a6?source=friends_link&sk=e4d46e0ef07add52b5c77fd3a9dd3387
🗣infosecb
🎖@malwr
https://loobins.io
You can find more details about the LOOBins project in my “Introducing LOOBins” Medium post here:
https://infosecb.medium.com/introducing-loobins-9e732b9e06a6?source=friends_link&sk=e4d46e0ef07add52b5c77fd3a9dd3387
🗣infosecb
🎖@malwr
LOOBins
Living Off the Orchard: macOS Binaries.
Fortinet researchers identified several simultaneous attacks targeting a government entity in the UAE. While most were classified as known threats, one remained unidentified - a custom targeted PowerShell-based backdoor with email-based C2 protocol. https://www.fortinet.com/blog/threat-research/operation-total-exchange-backdoor-discovered
🗣virusbtn
🎖@malwr
🗣virusbtn
🎖@malwr
How to geolocate mobile phones based on IP addresses?
http://nixintel.info/osint/geolocating-mobile-phones-with-an-ip/
@nixintel
@MwOsint
#OSINT #investigation #CTI #infosec #cybersecurity #DFIR #ThreatIntel #intelligence #reconnaissance
🗣DailyOsint
🎖@malwr
http://nixintel.info/osint/geolocating-mobile-phones-with-an-ip/
@nixintel
@MwOsint
#OSINT #investigation #CTI #infosec #cybersecurity #DFIR #ThreatIntel #intelligence #reconnaissance
🗣DailyOsint
🎖@malwr
Scan Container Images for Vulnerabilities with Docker Scout https://buff.ly/3OsMuVI #devops #opensource #automation
🗣osodevops
🎖@malwr
🗣osodevops
🎖@malwr
The New Stack
Scan Container Images for Vulnerabilities with Docker Scout
What sets Docker Scout apart from some of the other offerings is that it not only will display CVEs but also the composition of the image.
Tool Release: Code Credential Scanner (ccs) https://research.nccgroup.com/2023/05/23/tool-release-code-credential-scanner-ccs/
🗣Dinosn
🎖@malwr
🗣Dinosn
🎖@malwr
CrowdStrike Falcon Platform Achieves Certification in AV-Comparatives’ First Anti-Tampering Test
🗣BradW-CS
Tamper Resistant != Tamper Proof
👤Vengeful-Melon
Right. And yet it's still trivial?
Exit: W10 only
👤Doctorexx
🎖@malwr
🗣BradW-CS
Tamper Resistant != Tamper Proof
👤Vengeful-Melon
Right. And yet it's still trivial?
Exit: W10 only
👤Doctorexx
🎖@malwr
crowdstrike.com
CrowdStrike Achieves Certification in AV-Comparatives’ First Anti-Tampering Test
Learn how CrowdStrike Falcon Enterprise successfully defended against all tampering attacks to win certification in AV-Comparatives first Anti-Tampering test.
DNS Identity - This report provides a view of authentication and verification of domain name owners in the context of domain name registration. It identifies the security challenges, good practices, security controls and associated risks in the domain name registration ecosystem.
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
www.enisa.europa.eu
DNS Identity | ENISA
ENISA is the EU agency dedicated to enhancing cybersecurity in Europe. They offer guidance, tools, and resources to safeguard citizens and businesses from cyber threats.