-CyberSecurityTechnologies-


Гео и язык канала: Весь мир, Английский
Категория: Технологии


Welcome to -CyberSecurityTechnologies- Channel:
- BlueTeam (APT/OpSec/DFIR)
- OffSec (RedTeaming/TH/Pentesting)
- Reversing/Malware Analisys (TTPs)
- Web Security/DevSecOps
- AI Security/MLSecOps
- Tools/PoC/Research
Tags: t.me/CyberSecurityTechnologies/2

Связанные каналы  |  Похожие каналы

Гео и язык канала
Весь мир, Английский
Категория
Технологии
Статистика
Фильтр публикаций


Attacking_with_MSSQL.pdf
3.2Мб
#Whitepaper
#Red_Team_Tactics
"Attacking Modern Environments with MS-SQL Servers", 2022.




Spill_the_TeA.pdf
882.8Кб
#Research
#Mobile_Security
"Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones", 2024.
]-> https://github.com/HexHive/spill_the_tea/tree/sec-ae


#WLAN_Security
1. PMKID Attacks:
Debunking the 802.11r Myth
https://www.nccgroup.com/us/research-blog/pmkid-attacks-debunking-the-80211r-myth
2. Command injection vulnerability in getWindowsIEEE8021x (SSID)
https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m




Powell_Proof_pudding.pdf
1005.8Кб
#Threat_Research
#Malware_analysis
"The Proof is in the Pudding: EDR Configuration Versus Ransomware", 2024.




One_Solves_All.pdf
2.3Мб
#MLSecOps
#cryptography
"One Solves All: Exploring ChatGPT's Capabilities for Fully Automated Simple Power Analysis on Cryptosystems", 2024.
]-> https://github.com/haillife/One-Solves-All


KDA_Detect.pdf
5.9Мб
#DFIR
"Kerberos Delegation Attacks, Detections and Defenses", 2024.


#exploit
1. A Practical Guide to PrintNightmare in 2024 (updated Oct 5)
https://itm4n.github.io/printnightmare-exploitation
]-> PnP bypass

2. CVE-2024-12209:
WP Umbrella Unauthenticated LFI
https://github.com/Nxploited/CVE-2024-12209

3. CVE-2024-30085:
Windows 11 23H2 EoP
https://ssd-disclosure.com/ssd-advisory-cldflt-heap-based-overflow-pe


Recovering_wpa3.pdf
1.3Мб
#WLAN_Security
#Red_Team_Tactics
"Recovering WPA-3 Network Password by Bypassing the Simultaneous Authentication of Equals Handshake using Social Engineering Captive Portal", 2024.


Emb_Hack.pdf
867.0Кб
#Whitepaper
#Hardware_Security
"Embedded Hacking", 2024.


#Malware_analysis
#Offensive_security
LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory
https://unit42.paloaltonetworks.com/lightweight-directory-access-protocol-based-attacks


CleanCode_v2.pdf
30.3Мб
#DevOps
#Tech_book
#Sec_code_review
"Clean Code Principles and Patterns:
A Software Practitioner’s Handbook",
2nd Edition, 2024.


#exploit
1. CVE-2024-50379:
Apache Tomcat RCE
https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc

2. CVE-2024-48990:
Qualys needrestart


GAI_Mem_Analysis.pdf
4.4Мб
#Whitepaper
"Leveraging Generative Artificial Intelligence for Memory Analysis", 2024.


#info
Artificial Intelligence Vulnerability Scoring System (AIVSS)
https://github.com/kenhuangus/Artificial-Intelligence-Vulnerability-Scoring-System-AIVSS


ScamChatBot.pdf
747.6Кб
#Blue_Team_Techniques
"ScamChatBot: An End-to-End Analysis of Fake Account Recoveryon Social Media via Chatbots", 2024.


#tools
#Red_Team_Tactics
1. Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise
https://github.com/MWR-CyberSec/AD-CS-Forest-Exploiter
2. Databricks JDBC Attack via JAAS
https://blog.pyn3rd.com/2024/12/13/Databricks-JDBC-Attack-via-JAAS
3. Generate a proxy dll for arbitrary dll
https://github.com/namazso/dll-proxy-generator


Pract_Forensic_IOS_Android.pdf
20.4Мб
#DFIR
#Tech_book
#Mobile_Security
"Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices", 2022.

Показано 20 последних публикаций.