home.social

#eternalblue — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #eternalblue, aggregated by home.social.

  1. Potatoes, EternalBlue, PrintNightmare: способы детектирования уязвимостей протокола SMB

    Всем привет! Меня зовут Влад Кузнецов, я аналитик SOC в К2 Кибербезопасность . SMB — один из самых распространенных протоколов сетевой коммуникации для безопасного управления файлами и различными службами удаленного сервера. Несмотря на свою незаменимость, протокол SMB может быть отличной лазейкой для хакерских атак. В этой статье я расскажу о принципах эксплуатации и способах детектирования таких уязвимостей, как Potatoes, EternalBlue, PrintNightmare, а также о скрипте SMBExec. В конце материала вы найдете подробную информацию о настройке политик расширенного аудита и список общих рекомендаций по локализации и устранению уязвимостей, связанных с протоколом SMB.

    habr.com/ru/companies/k2tech/a

    #smb #smb_протокол #уязвимости #уязвимость #rottenpotato #eternalblue #printnightmare #сетевой_протокол #кибербезопасность #информационная_безопасность

  2. Also be sure to turn on these monitoring policies in #DefenderForCloudApps so you can #CatchTheHacker before they get too deep, whether you switch to #Kerberos or not. #NetworkSegregation is also a great #LayeredDefense method to ensure if one system is compromised the attacker can't use #SMBtraversal to get to all your computers, globally. #EternalBlue source code is still being used to get to #DCs via #Trikbot evolutions, after #Phishing a user with #LocalAdmin privileges, to execute #mimikatz against #ActiveDirectory to steal all the objects. #YesThisHappened

  3. Also be sure to turn on these monitoring policies in #DefenderForCloudApps so you can #CatchTheHacker before they get too deep, whether you switch to #Kerberos or not. #NetworkSegregation is also a great #LayeredDefense method to ensure if one system is compromised the attacker can't use #SMBtraversal to get to all your computers, globally. #EternalBlue source code is still being used to get to #DCs via #Trikbot evolutions, after #Phishing a user with #LocalAdmin privileges, to execute #mimikatz against #ActiveDirectory to steal all the objects. #YesThisHappened

  4. Also be sure to turn on these monitoring policies in #DefenderForCloudApps so you can #CatchTheHacker before they get too deep, whether you switch to #Kerberos or not. #NetworkSegregation is also a great #LayeredDefense method to ensure if one system is compromised the attacker can't use #SMBtraversal to get to all your computers, globally. #EternalBlue source code is still being used to get to #DCs via #Trikbot evolutions, after #Phishing a user with #LocalAdmin privileges, to execute #mimikatz against #ActiveDirectory to steal all the objects. #YesThisHappened

  5. Also be sure to turn on these monitoring policies in #DefenderForCloudApps so you can #CatchTheHacker before they get too deep, whether you switch to #Kerberos or not. #NetworkSegregation is also a great #LayeredDefense method to ensure if one system is compromised the attacker can't use #SMBtraversal to get to all your computers, globally. #EternalBlue source code is still being used to get to #DCs via #Trikbot evolutions, after #Phishing a user with #LocalAdmin privileges, to execute #mimikatz against #ActiveDirectory to steal all the objects. #YesThisHappened

  6. ✨ CVE-2022-37958:
    Critical Windows code-execution vulnerability went undetected until now

    ▶️ Potential to rival EternalBlue

    ▶️ Wormable

    ▶️ Unlike EternalBlue, Vulnerability present in a much broader range of network protocols

    ▶️ Good news: patch was released in September. hopefully all of us applied it

    arstechnica.com/information-te

    #infosec #eternalblue #patching #securityadvisory #sysadmin #blueteam #windowsvulnerability

  7. Eternally Blue: Baltimore City leaders blame NSA for ransomware attack - Enlarge / Baltimore: An IT disaster area? (credit: Cyndi Monaghan via Getty Images)
    The mayor an... more: arstechnica.com/?p=1511339 #baltimorecityransomware #nationalsecurityagency #shadowbrokers #eternalblue #microsoft #windows #biz&it #policy #nsa

  8. In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc - nytimes.com/2019/05/25/us/nsa- #rr […] “There are warehouses of kids overseas firing off phishing emails,” […] like thugs shooting military-grade weapons at random targets. […] #EternalBlue #NSA #ShadowBrokers