#eternalblue — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #eternalblue, aggregated by home.social.
-
Potatoes, EternalBlue, PrintNightmare: способы детектирования уязвимостей протокола SMB
Всем привет! Меня зовут Влад Кузнецов, я аналитик SOC в К2 Кибербезопасность . SMB — один из самых распространенных протоколов сетевой коммуникации для безопасного управления файлами и различными службами удаленного сервера. Несмотря на свою незаменимость, протокол SMB может быть отличной лазейкой для хакерских атак. В этой статье я расскажу о принципах эксплуатации и способах детектирования таких уязвимостей, как Potatoes, EternalBlue, PrintNightmare, а также о скрипте SMBExec. В конце материала вы найдете подробную информацию о настройке политик расширенного аудита и список общих рекомендаций по локализации и устранению уязвимостей, связанных с протоколом SMB.
https://habr.com/ru/companies/k2tech/articles/892202/
#smb #smb_протокол #уязвимости #уязвимость #rottenpotato #eternalblue #printnightmare #сетевой_протокол #кибербезопасность #информационная_безопасность
-
Also be sure to turn on these monitoring policies in #DefenderForCloudApps so you can #CatchTheHacker before they get too deep, whether you switch to #Kerberos or not. #NetworkSegregation is also a great #LayeredDefense method to ensure if one system is compromised the attacker can't use #SMBtraversal to get to all your computers, globally. #EternalBlue source code is still being used to get to #DCs via #Trikbot evolutions, after #Phishing a user with #LocalAdmin privileges, to execute #mimikatz against #ActiveDirectory to steal all the objects. #YesThisHappened
-
Also be sure to turn on these monitoring policies in #DefenderForCloudApps so you can #CatchTheHacker before they get too deep, whether you switch to #Kerberos or not. #NetworkSegregation is also a great #LayeredDefense method to ensure if one system is compromised the attacker can't use #SMBtraversal to get to all your computers, globally. #EternalBlue source code is still being used to get to #DCs via #Trikbot evolutions, after #Phishing a user with #LocalAdmin privileges, to execute #mimikatz against #ActiveDirectory to steal all the objects. #YesThisHappened
-
Also be sure to turn on these monitoring policies in #DefenderForCloudApps so you can #CatchTheHacker before they get too deep, whether you switch to #Kerberos or not. #NetworkSegregation is also a great #LayeredDefense method to ensure if one system is compromised the attacker can't use #SMBtraversal to get to all your computers, globally. #EternalBlue source code is still being used to get to #DCs via #Trikbot evolutions, after #Phishing a user with #LocalAdmin privileges, to execute #mimikatz against #ActiveDirectory to steal all the objects. #YesThisHappened
-
Also be sure to turn on these monitoring policies in #DefenderForCloudApps so you can #CatchTheHacker before they get too deep, whether you switch to #Kerberos or not. #NetworkSegregation is also a great #LayeredDefense method to ensure if one system is compromised the attacker can't use #SMBtraversal to get to all your computers, globally. #EternalBlue source code is still being used to get to #DCs via #Trikbot evolutions, after #Phishing a user with #LocalAdmin privileges, to execute #mimikatz against #ActiveDirectory to steal all the objects. #YesThisHappened
-
✨ CVE-2022-37958:
Critical Windows code-execution vulnerability went undetected until now▶️ Potential to rival EternalBlue
▶️ Wormable
▶️ Unlike EternalBlue, Vulnerability present in a much broader range of network protocols
▶️ Good news: patch was released in September. hopefully all of us applied it
#infosec #eternalblue #patching #securityadvisory #sysadmin #blueteam #windowsvulnerability
-
Eternally Blue: Baltimore City leaders blame NSA for ransomware attack - Enlarge / Baltimore: An IT disaster area? (credit: Cyndi Monaghan via Getty Images)
The mayor an... more: https://arstechnica.com/?p=1511339 #baltimorecityransomware #nationalsecurityagency #shadowbrokers #eternalblue #microsoft #windows #biz&it #policy #nsa -
In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc - https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html #rr […] “There are warehouses of kids overseas firing off phishing emails,” […] like thugs shooting military-grade weapons at random targets. […] #EternalBlue #NSA #ShadowBrokers