Технологический Болт Генона
8.27K subscribers
3.05K photos
373 videos
214 files
3.92K links
До Декарта никогда не существовало рационализма.

Музыкальный Болт Генона: @mus_b0lt_Genona
Мемный Болт Генона: @mem_b0lt_Genona
Кадровый Болт Генона @kadr_b0lt_Genona

Обратная связь: @rusdacent
Download Telegram
Forwarded from Security Wine (бывший - DevSecOps Wine) (Denis Yakimov)
Лучшие практики при написании безопасного Dockerfile

Выпустил следующую статью на Хабр, в которой постарался агрегировать лучшие практики по написанию безопасного Dockerfile. В статье:

- Почему COPY, лучше чем ADD
- Полезные лейблы (securitytxt)
- Как скачивать компоненты из Интернета при сборке образа, избегая MiTM атаки
- Почему нужно задавать USER в конце и как может помочь gosu
- Затронута тема минимальных и Distroless образов
- Безопасная работа с секретами (multi-stage сборка, фича BuildKit, проблемы рекурсивного копирования)
- Существующие анализаторы Dockerfile
- Разные полезные доп. материалы

https://habr.com/ru/company/swordfish_security/blog/537280/

#dev #docker
These are tools for reporting and alerting about security information and events on linux systems. The focus is on gathering and annotating authentication, authorization and system configuration information and reporting and alerting based on this information.
. . .
Overview of tools
sec-gather-iptables: Output firewall rules
sec-gather-listenports: Output listening services / ports
sec-gather-misconfigs: Scan for common security misconfigurations
sec-gather-mysqlusers: Output MySQL users and privileges
sec-gather-openvpnusers: Output OpenVPN client certificate status
sec-gather-portscan: Output open ports detected through a portscan of a host
sec-gather-unixgroups: Output unix groups and their members
sec-gather-unixsessions: Output info on login sessions
sec-gather-unixusers: Output unix users and their details
sec-gather-http-headers: Output HTTP security headers for URLs
sec-gather-sslscan: Output SSL / TLS protocol and ciphers for ports
sec-gather-perms: Output files and dirs with dangerous permissions
sec-diff: Output changes in sec-gather-* script output since last time
sec-report: Generate HTML and PDF reports from gathered info
sec-mail: Send alerts and reports.


https://github.com/fboender/sec-tools
Пишем USB-драйверы для заброшенных устройств
https://habr.com/ru/post/476434/
В среду чипировался "Спутником V"

Из побочек: вялость и постоянное желание спать. Наверное по часов 12 каждый день проспал. Может больше. Температуры не было.

После второго укола планирую принимать 5G и иметь прямую связь с Гейтсом.

Задавайте ваши ответы в коментариях, делитесь своим мнением и тем как у вас чипирование прошло.
> There were not many cases where the ARM instance becomes slower than the x86 instance in the tests we performed. The test results were consistent throughout the testing of the last couple of days. While ARM-based instance is 25 percent cheaper, it is able to show a 15-20% performance gain in most of the tests over the corresponding x86 based instances.

PostgreSQL on ARM-based AWS EC2 Instances: Is It Any Good?
https://www.percona.com/blog/2021/01/22/postgresql-on-arm-based-aws-ec2-instances-is-it-any-good/
Automation for abusing an exposed Docker TCP Socket.

This will automatically create a container on the Docker host with the host's root filesystem mounted, allowing arbitrary read and write of the host filesystem (which is bad).

Once created, the script will employ the method of your choosing for obtaining a root shell. All methods are now working properly, and will return a reverse shell. Chroot is the least disruptive, but Useradd is the default.


Python automation of Docker.sock abuse
https://github.com/AbsoZed/DockerPwn.py
Linux is now completely usable on the Mac mini M1. Booting from USB a full Ubuntu desktop (rpi). Network works via a USB c dongle. Update includes support for USB, I2C, DART. We will push changes to our GitHub and a tutorial later today.
https://twitter.com/cmwdotme/status/1351838924621099008

https://github.com/corellium/linux-m1
aosp.gif
30 MB
Компания T-Head собрала порт Android 10 для процессоров архитектуры RISC-V
https://habr.com/ru/company/itsumma/news/t/538852/
+
https://github.com/T-head-Semi/aosp-riscv
Forwarded from CloudSec Wine
🔸Auditing PassRole: A Problematic Privilege Escalation Permission

iam:PassRole is an AWS permission that enables critical privilege escalation; many supposedly low-privilege identities tend to have it. The PassRole permission requirement is ubiquitous. It extends to more than 300 actions in more than 90 services and, in some cases, is obscured by parameters that indirectly contain the role being passed. Comprehensively auditing it can be a handful but is absolutely worth it as not doing so means leaving relatively easy avenues for privilege escalation wide open.

https://ermetic.com/whats-new/blog/auditing-passrole-a-problematic-privilege-escalation-permission/

#aws
Forwarded from Админим с Буквой (bykva)
А еще я каким-то образом вдруг сделал вклад в опенсорс и написал (ну не только я, а еще с помощью моих коллег из ситимобил) ansible роли для разворачивания victoriametrics.

https://github.com/VictoriaMetrics/ansible-playbooks
Forwarded from }{0tt@bь)ч (alekum)
Heap-based buffer overflow in Sudo (CVE-2021-3156)

Nice write-up and root cause analysis of the bug.

Summary
========================================================================

We discovered a heap-based buffer overflow in Sudo
(
https://www.sudo.ws/). This vulnerability:

- is exploitable by any local user (normal users and system users,
sudoers and non-sudoers), without authentication (i.e., the attacker
does not need to know the user's password);

- was introduced in July 2011 (commit 8255ed69), and affects all legacy
versions from 1.8.2 to 1.8.31p2 and all stable versions from 1.9.0 to
1.9.5p1, in their default configuration.

We developed three different exploits for this vulnerability, and
obtained full root privileges on Ubuntu 20.04 (Sudo 1.8.31), Debian 10
(Sudo 1.8.27), and Fedora 33 (Sudo 1.9.2). Other operating systems and
distributions are probably also exploitable.


https://www.openwall.com/lists/oss-security/2021/01/26/3
This media is not supported in your browser
VIEW IN TELEGRAM
Тут хорошие люди запилили интересный продукт для людей (и не только), которые занимаются пентестом.

Ссылка на анонс
https://twitter.com/_hexway/status/1354486785699684352

Посмотреть про функциональность можно на прикреплённом видео (или тут https://www.youtube.com/watch?v=CdzC5GyjgO0) и на сайте
https://hexway.io/

Там же на сайте можно скачать приложение, что бы попробовать оставив свою почту.