#enumeration — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #enumeration, aggregated by home.social.
-
@da_667 it is civilized to proxy that shit (it is the vast majority of the traffic, mostly) and use your own certs, should you proxy through yacy and spider every site you visit? should you use squid proxy to speed up browsing? those options are left to the reader - they all work and you can get reports - are most smb going to do lots of threat hunting probably not but they may go hybrid #unknown binary #ntopng #top talkers #comp intel #enumeration #attribution
-
@da_667 it is civilized to proxy that shit (it is the vast majority of the traffic, mostly) and use your own certs, should you proxy through yacy and spider every site you visit? should you use squid proxy to speed up browsing? those options are left to the reader - they all work and you can get reports - are most smb going to do lots of threat hunting probably not but they may go hybrid #unknown binary #ntopng #top talkers #comp intel #enumeration #attribution
-
@da_667 it is civilized to proxy that shit (it is the vast majority of the traffic, mostly) and use your own certs, should you proxy through yacy and spider every site you visit? should you use squid proxy to speed up browsing? those options are left to the reader - they all work and you can get reports - are most smb going to do lots of threat hunting probably not but they may go hybrid #unknown binary #ntopng #top talkers #comp intel #enumeration #attribution
-
@da_667 it is civilized to proxy that shit (it is the vast majority of the traffic, mostly) and use your own certs, should you proxy through yacy and spider every site you visit? should you use squid proxy to speed up browsing? those options are left to the reader - they all work and you can get reports - are most smb going to do lots of threat hunting probably not but they may go hybrid #unknown binary #ntopng #top talkers #comp intel #enumeration #attribution
-
🤔 Ever wonder how to escape from a container? Or how security tools know what permissions they have from inside that same container? It's nice to have a great script for #enumeration ... but what does it check for and why does it matter?
Who am I? - Let’s get oriented and figure out what we have in our container. (https://some-natalie.dev/container-escapes-whoami/)
Our shared kernel - #Containers are processes that share a kernel. What can we see about our host? (https://some-natalie.dev/container-escapes-shared-kernel/)
Are we capable? - What sort of capabilities do we have? (https://some-natalie.dev/container-escapes-capabilities/)
Seccomp is your friend - #Seccomp filters what a container can do. Let’s learn what’s been set for us. (https://some-natalie.dev/container-escapes-seccomp/)
Are we in a microVM? - With #microVM runtimes gaining popularity, how do you know if you’re in a container? (https://some-natalie.dev/blog/microvm-or-container/)
(or, I did a little editing and put my workshop from @appsec_village at #DEFCON33 up) :heart_cybre: