EN
creator cover Overkill Security

Overkill Security

Nothing Says 'Secure' Like a Dozen Firewalls
Overkill Security
113
subscribers

About the creator

A blog about all things techy! Not too much hype, just a lot of cool analysis and insight from different sources.
📌Not sure what level is suitable for you? Check this explanation https://boosty.to/overkill_security/posts/4615ab87-6554-426e-bc24-b0b0b163716d
The main categories of materials - use tags:
📌news
📌digest
📌all pdf
QA - directly or via email overkill_qa@outlook.com
Show more
Creator has disabled comments for this post.
Hacking the Hippocratic Oath. Forensic Fun with Medical IoT
Read the Announcement. https://boosty.to/overkill_security/posts/ba0a6246-d7f6-485c-881f-95b40f73137e
Level required:
Regular Reader

Hacking the Hippocratic Oath. Forensic Fun with Medical IoT. Announcement

this document provides a comprehensive analysis of Medical Internet of Things (IoMT) Forensics, focusing on various critical aspects relevant to the field, including examination of current forensic methodologies tailored for IoT environments, highlighting their adaptability and effectiveness in medical contexts; techniques for acquiring digital evidence from medical IoT devices, considering the unique challenges posed by these devices; exploration of privacy issues and security vulnerabilities inherent in medical IoT systems, and how these impact forensic investigations; review of the tools and technologies used in IoT forensics, with a focus on those applicable to medical devices; analysis of real-world case studies where medical IoT devices played a crucial role in forensic investigations, providing practical insights and lessons learned.
Show more
Creator has disabled comments for this post.

The Dark Side of LSASS: How Evil Twins Bypass Security Measures

The EvilLsassTwin project on GitHub, found in the Nimperiments repository, focuses on a specific technique for extracting credentials from the Local Security Authority Subsystem Service (LSASS) process on Windows systems. 
📌Objective: The project aims to demonstrate a method for credential dumping from the LSASS process, which is a common target for attackers seeking to obtain sensitive information such as passwords and tokens.
Show more
Creator has disabled comments for this post.
Leveraging Energy Consumption Patterns for Cyberattack Detection in IoT Systems
Read the announcement. https://boosty.to/overkill_security/posts/1114ffe1-c544-4f4c-8fc2-e5db75da8477
Level required:
Regular Reader

Leveraging Energy Consumption Patterns for Cyberattack Detection in IoT Systems. Announcement

This document provides a comprehensive analysis of the energy consumption of smart devices during cyberattacks, focusing on various aspects critical to understanding and mitigating these threats: types of cyberattacks, detection techniques, benefits and drawbacks, applicability across industries, integration options.
This qualitative analysis provides valuable insights for cybersecurity professionals, IoT specialists, and industry stakeholders. The analysis is beneficial for enhancing the security and resilience of IoT systems, ensuring the longevity and performance of smart devices, and addressing the economic and environmental implications of increased energy consumption during cyberattacks. By leveraging advanced detection techniques and integrating them with existing security measures, organizations can better protect their IoT infrastructure from evolving cyber threats.
Show more
Creator has disabled comments for this post.
Show more
Creator has disabled comments for this post.

CVE-2024-27130 in QNAP: When 'Secure' is Just a Marketing Term

The article "QNAP QTS - QNAPping At The Wheel (CVE-2024-27130 and friends)" from WatchTowr Labs provides a detailed analysis of several vulnerabilities found in QNAP NAS devices.
CVE-2024-27130. Stack Buffer Overflow in share.cgi: The vulnerability arises from the unsafe use of the strcpy function in the No_Support_ACL function, which is accessible via the get_file_size function in share.cgi. This leads to a stack buffer overflow, which can be exploited to achieve Remote Code Execution (RCE).
Show more
Creator has disabled comments for this post.

MalPurifier. Detoxifying Your Android, One Malicious Byte at a Time

Another document to analyze. This time, it's the riveting "MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks." Because, you know, the world really needed another paper on Android malware detection.
First, we'll dive into the Introduction and Motivation to understand why yet another solution to the ever-escalating threats of Android malware is necessary. Spoiler alert: it's because current machine learning-based approaches are as vulnerable as a house of cards in a windstorm.
Show more
Creator has disabled comments for this post.

Root Privileges for Dummies: Just Exploit CVE-2024-3400

CVE-2024-3400 (+ url + github url#1, url#2) is a critical command injection vulnerability in Palo Alto Networks' PAN-OS software, specifically affecting the GlobalProtect feature. This vulnerability allows an unauthenticated, remote attacker to execute arbitrary code with root privileges on the affected firewall. The vulnerability impacts PAN-OS versions 10.2, 11.0, and 11.1 when configured with GlobalProtect gateway or GlobalProtect portal.
Show more
Creator has disabled comments for this post.

Subscription levels

Regular Reader

$ 18,2$ 9,1 per month
50%
Ideal for casual regular who are interested in staying informed about the latest trends and updates in the cybersecurity world

Pro Reader

$ 37 per month
Designed for IT professionals, cybersecurity experts, and enthusiasts who seek deeper insights and more comprehensive resources. + Q&A
Go up