Hunting Lazarus Groupβs TTPs. Introduction | by montysecurity | May, 2023 | Medium https://montysecurity.medium.com/hunting-lazarus-groups-ttps-925c17469077
π£NeobeePaul
π@malwr
π£NeobeePaul
π@malwr
Medium
Hunting Lazarus Groupβs TTPs
Introduction
π₯1
Docker for Pentester
Abusing Docker API
https://www.hackingarticles.in/docker-for-pentester-abusing-docker-api/
Image Vulnerability Assessment
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/
Pentesting Framework
https://www.hackingarticles.in/docker-for-pentester-pentesting-framework/
Docker Privilege Escalation
https://www.hackingarticles.in/docker-privilege-escalation/
#infosec #cybersecurity #cybersecuritytips #pentestingβ¦
π£hackinarticles
π@malwr
Abusing Docker API
https://www.hackingarticles.in/docker-for-pentester-abusing-docker-api/
Image Vulnerability Assessment
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/
Pentesting Framework
https://www.hackingarticles.in/docker-for-pentester-pentesting-framework/
Docker Privilege Escalation
https://www.hackingarticles.in/docker-privilege-escalation/
#infosec #cybersecurity #cybersecuritytips #pentestingβ¦
π£hackinarticles
π@malwr
π₯2
Windows Security Log Quick Reference Cheat-sheet Credit:https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspxβ¦β¦
#cybersecurity #pentesting #informationsecurity #hacking #DataSecurity #CyberSec #Hackers #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness
π£Shubham_pen
π@malwr
#cybersecurity #pentesting #informationsecurity #hacking #DataSecurity #CyberSec #Hackers #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness
π£Shubham_pen
π@malwr
Nice beginners series by @IntezerLabs on malware reverse engineering
Part 1: https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Part 2: https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/
#malware
π£0xor0ne
π@malwr
Part 1: https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Part 2: https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/
#malware
π£0xor0ne
π@malwr
π₯1
Malware Reverse Engineering for Beginners - Part 2 https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ #Pentesting #Malware #ReverseEngineering #CyberSecurity #Infosec
π£ptracesecurity
π@malwr
π£ptracesecurity
π@malwr
DFIR Framework for OT
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8428.pdf
Join us to get access to the best cyber security research and innovation reports and other essential tools for cyber professionals:
https://cyberstartupobservatory.com/cyber-security-newsletter/
#CyberSecurity #InfoSec #InformationSecurity
π£MaiteOrtegaCSO
π@malwr
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8428.pdf
Join us to get access to the best cyber security research and innovation reports and other essential tools for cyber professionals:
https://cyberstartupobservatory.com/cyber-security-newsletter/
#CyberSecurity #InfoSec #InformationSecurity
π£MaiteOrtegaCSO
π@malwr
Investigate Attack Patterns using SIEM, Sysmon Utility and MITRE ATT&CK | by Kelvin Ling | Medium https://medium.com/@kelvin_ling/investigate-attack-patterns-using-siem-sysmon-utility-and-mitre-att-ck-5a569b2a9d4b
π£NeobeePaul
π@malwr
π£NeobeePaul
π@malwr
Medium
Investigate Attack Patterns using SIEM, Sysmon Utility and MITRE ATT&CK
In the βNew Hire Old Artifactsβ TryHackMe room, we can investigate a cyber incident using SIEM softwareβββSplunk. The logs provided toβ¦
Here are the slides from @cffsmith and myself about some of our recent work in the JavaScript engine fuzzing space, presented @offensive_con last week: https://saelo.github.io/presentations/offensivecon_23_advancements_in_javascript_engine_fuzzing.pdf
π£5aelo
π@malwr
π£5aelo
π@malwr
Presentation Slides
Collections of Dhiyaneshwaran public presentation slides.
https://github.com/DhiyaneshGeek/My-Presentation-Slides
#cybersecurity #infosec #pentesting
https://t.me/hackgit/8855
π£hack_git
π@malwr
Collections of Dhiyaneshwaran public presentation slides.
https://github.com/DhiyaneshGeek/My-Presentation-Slides
#cybersecurity #infosec #pentesting
https://t.me/hackgit/8855
π£hack_git
π@malwr
semgrep: Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
βοΈ 8202
Author: @semgrep
#golang
https://github.com/returntocorp/semgrep
π£GolangRepos
π@malwr
βοΈ 8202
Author: @semgrep
#golang
https://github.com/returntocorp/semgrep
π£GolangRepos
π@malwr
GitHub
GitHub - semgrep/semgrep: Lightweight static analysis for many languages. Find bug variants with patterns that look like sourceβ¦
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code. - semgrep/semgrep
gato: GitHub Self-Hosted Runner Enumeration and Attack Tool - an enumeration and attack tool that allows both blue teamers and offensive security practitioners to evaluate the blast radius of a compromised personal access token within a GitHub organization.
π£digicat
π@malwr
π£digicat
π@malwr
GitHub
GitHub - praetorian-inc/gato: GitHub Actions Pipeline Enumeration and Attack Tool
GitHub Actions Pipeline Enumeration and Attack Tool - praetorian-inc/gato
ESET researchers reveal details of a prevalent cryptor, operating as a cryptor-as-a-service, used by tens of malware families. AceCryptor is heavily obfuscated and throughout the years has incorporated many techniques to avoid detection. https://www.welivesecurity.com/2023/05/25/shedding-light-acecryptor-operation/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
JPCERT/CC's Yuma Masubuchi provides details of an attack targeting Linux routers with the GobRAT malware. The attacker initially targets a router with WEBUI open to the public, executes scripts possibly by using vulnerabilities, & finally executes GobRAT. https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Trend Micro's Sarah Pearl Camiling & Paul John Bardon write about a new Go-based information-stealing malware named Bandit Stealer, which targets numerous browsers and cryptocurrency wallets while evading detection. https://www.trendmicro.com/en_us/research/23/e/new-info-stealer-bandit-stealer-targets-browsers-wallets.html
π£virusbtn
π@malwr
π£virusbtn
π@malwr
π1