Sys-Admin Up


Kanal geosi va tili: Qozog‘iston, Inglizcha


InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Qozog‘iston, Inglizcha
Statistika
Postlar filtri


red_hat_enterprise_linux_9_configuring_firewalls_and_packet_filters.pdf
629.7Kb
Configuring firewalls and packet filters

Managing the firewalld service, the nftables framework, and XDP packet filtering features (doc from RHEL 9)


Zyxel NAS Under Attack

The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request (CVE-2024-29973. NVD Last Modified 06/24/2024):

https://nvd.nist.gov/vuln/detail/CVE-2024-29973

Five new vulnerabilities found in Zyxel NAS devices (including code execution and privilege escalation)

Detailed research:

https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/




Remote Network Latency Measurements Leak User Activity

https://snailload.com/

Paper:

https://snailload.com/snailload.pdf






DejaVU - Open Source Deception Platform

Deception to detect common adversary tactics and techniques during various stages of attack lifecycle..:

https://github.com/bhdresh/Dejavu


Modern Approaches to Network Access Security-508c.pdf
503.1Kb
Modern Approaches To Network Access Security from CISA (Publication: June 18, 2024)


Windows Wi-Fi Driver Remote Code Execution Vulnerability

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-30078
















Chrome Manifest v2 RIP coming soon . Google has set the first date for getting rid of the manifest for this version.

Starting on June 3 on the Chrome Beta, Dev and Canary channels, if users still have Manifest V2 extensions installed, some will start to see a warning banner when visiting their extension management page..:

https://blog.chromium.org/2024/05/manifest-v2-phase-out-begins.html


Disrupting FlyingYeti's campaign

FlyingYeti is the cryptonym given by Cloudforce One to the threat group behind this phishing campaign, which overlaps with UAC-0149 activity tracked by CERT-UA in February and April 2024.

https://blog.cloudflare.com/disrupting-flyingyeti-campaign-targeting-ukraine


Freeway is a Python scapy-based tool for WiFi penetration that aim to help ethical hackers and pentesters develop their skills and knowledge in auditing and securing home or enterprise networks.

https://github.com/FLOCK4H/Freeway



20 ta oxirgi post ko‘rsatilgan.