home.social

#dirtypipe — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #dirtypipe, aggregated by home.social.

  1. #RevueDePressive

    La faille du jour sous Linux : #DirtyFrag
    github.com/V4bel/dirtyfrag
    Grosse faille (à la suite de #DirtyPipe et #CopyFail) !

    Malheureusement, à cause de la rupture d'embargo, il n'y a pas encore de patchs disponibles !!!

    Le mieux est de supprimer les modules concernés :
    sh -c "printf 'install esp4 /bin/false
    install esp6 /bin/false
    install rxrpc /bin/false
    ' > /etc/modprobe.d/dirtyfrag.con…

    #Linux #Faille #CyberSécurité

    lesliensde.jeey.net/shaare/Sj8

  2. Happy Monday everyone!

    We are going to start this week off with a nice resource in our #readoftheday! If you have yet to hear about Wazuh, now is your chance! It is a free, open-source security platform that protects data assets from threats [2]. In this article, the researchers cover what abusing Living-off-the-Land binaries (LOLBINs) looks like from the perspective of an Ubuntu and Kali Linux endpoint and focus on the #DirtyPipe exploit and the DDexec utility. After walking readers through the emulation they then discuss how Wazuh helps detect these techniques. It is a good read and a resource I want to get into my own lab to start playing with!

    As always, check out the full article and others by Wazuh researchers on their blog and stay tuned for the threat hunting tip of the day! Enjoy and Happy Hunting!

    Detecting Living Off the Land attacks with Wazuh
    wazuh.com/blog/detecting-livin

    Other reference:
    github.com/wazuh/wazuh [2]

    Intel 471 #CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #Intel471