General
-
Target
Attacks on various OSI Model layers _ by Ehsan Ahmadi _ Medium.pdf
-
Size
3.5MB
-
MD5
e409c8b3e72a10efb302ffb7fab77b0a
-
SHA1
ba1c063de043289dc7a1d33a3d21aa41f35377eb
-
SHA256
d441f573ff06c586684667a5da6ba03e6ced0ad9556201cddbcd5e86a45b8b8b
-
SHA512
21b2016fefa2dc181d57105040f560b3dc92f6f5a97e01519146cbd784902b3e3a107f60ad0cf4645172d364df0a80e03c3f3a2cc1b3c48a74fed782dd148da1
-
SSDEEP
98304:5f/3EsA7a4+ud7Tyiu8FLPA0C0qxpPC/WOuLejXuY4GuYU5:BrM/9THu8FLPA0PqxpPxxq6Y1uYs
Malware Config
Signatures
Files
-
Attacks on various OSI Model layers _ by Ehsan Ahmadi _ Medium.pdf.pdf
-
https://medium.com/@e.ahmadi?source=post_page-----bd2fac5ab985--------------------------------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fsubscribe%2Fuser%2F975f8e6b7ae9&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fattacks-on-various-osi-model-layers-bd2fac5ab985&user=Ehsan+Ahmadi&userId=975f8e6b7ae9&source=post_page-975f8e6b7ae9----bd2fac5ab985---------------------post_header-----------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2Fplans%3Fdimension%3Dpost_audio_button%26postId%3Dbd2fac5ab985&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fattacks-on-various-osi-model-layers-bd2fac5ab985&source=-----bd2fac5ab985---------------------post_audio_button-----------
-
https://rsci.app.link/?%24canonical_url=https%3A%2F%2Fmedium.com%2Fp%2Fbd2fac5ab985&%7Efeature=LoOpenInAppButton&%7Echannel=ShowPostUnderUser&source=---two_column_layout_nav----------------------------------
-
https://medium.com/m/signin?operation=login&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fattacks-on-various-osi-model-layers-bd2fac5ab985&source=post_page---two_column_layout_nav-----------------------global_nav-----------
-
https://medium.com/?source=---two_column_layout_nav----------------------------------
-
https://www.techopedia.com/definition/4113/sniffer
-
https://www.tripwire.com/state-of-security/featured/common-basic-port-scanning-techniques/
-
https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/
-
https://www.tripwire.com/state-of-security/security-awareness/psychological-tricks-malware-trade/
-
https://en.wikipedia.org/wiki/Magic_cookie
-
https://www.avast.com/c-ddos
-
https://blog.avast.com/what-is-bluekeep
-
https://medium.com/tag/cybersecurity?source=post_page-----bd2fac5ab985---------------cybersecurity-----------------
-
https://medium.com/tag/security?source=post_page-----bd2fac5ab985---------------security-----------------
-
https://medium.com/m/signin?actionUrl=%2F_%2Fapi%2Fsubscriptions%2Fnewsletters%2Fade8cb1e2980&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fattacks-on-various-osi-model-layers-bd2fac5ab985&newsletterV3=975f8e6b7ae9&newsletterV3Id=ade8cb1e2980&user=Ehsan+Ahmadi&userId=975f8e6b7ae9&source=-----bd2fac5ab985---------------------subscribe_user-----------
-
https://medium.com/@e.ahmadi/followers?source=post_page-----bd2fac5ab985--------------------------------
-
https://medium.com/@e.ahmadi/monitoring-your-system-with-prometheus-and-grafana-efb328cedd4b?source=author_recirc-----bd2fac5ab985----0---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi?source=author_recirc-----bd2fac5ab985----0---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi/monitoring-your-system-with-prometheus-and-grafana-efb328cedd4b?responsesOpen=true&sortBy=REVERSE_CHRON&source=author_recirc-----bd2fac5ab985----0---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2Fefb328cedd4b&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fmonitoring-your-system-with-prometheus-and-grafana-efb328cedd4b&source=-----bd2fac5ab985----0-----------------bookmark_preview----a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi/connect-django-channel-service-through-kong-gateway-by-websocket-e28f2cfac081?source=author_recirc-----bd2fac5ab985----1---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fp%2Fefb328cedd4b&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fmonitoring-your-system-with-prometheus-and-grafana-efb328cedd4b&user=Ehsan+Ahmadi&userId=975f8e6b7ae9&source=-----efb328cedd4b----0-----------------clap_footer----a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi?source=author_recirc-----bd2fac5ab985----1---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi/connect-django-channel-service-through-kong-gateway-by-websocket-e28f2cfac081?responsesOpen=true&sortBy=REVERSE_CHRON&source=author_recirc-----bd2fac5ab985----1---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2Fe28f2cfac081&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fconnect-django-channel-service-through-kong-gateway-by-websocket-e28f2cfac081&source=-----bd2fac5ab985----1-----------------bookmark_preview----a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi/manage-concurrency-in-multiple-python-clients-in-redis-5f9a05836a92?source=author_recirc-----bd2fac5ab985----2---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi?source=author_recirc-----bd2fac5ab985----2---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi/manage-concurrency-in-multiple-python-clients-in-redis-5f9a05836a92?responsesOpen=true&sortBy=REVERSE_CHRON&source=author_recirc-----bd2fac5ab985----2---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2F5f9a05836a92&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fmanage-concurrency-in-multiple-python-clients-in-redis-5f9a05836a92&source=-----bd2fac5ab985----2-----------------bookmark_preview----a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fp%2Fe28f2cfac081&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fconnect-django-channel-service-through-kong-gateway-by-websocket-e28f2cfac081&user=Ehsan+Ahmadi&userId=975f8e6b7ae9&source=-----e28f2cfac081----1-----------------clap_footer----a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fp%2F5f9a05836a92&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fmanage-concurrency-in-multiple-python-clients-in-redis-5f9a05836a92&user=Ehsan+Ahmadi&userId=975f8e6b7ae9&source=-----5f9a05836a92----2-----------------clap_footer----a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi/three-replicas-of-rabbitmq-in-docker-swarm-with-nfs-shared-storage-e91e7cd32bf6?source=author_recirc-----bd2fac5ab985----3---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi?source=author_recirc-----bd2fac5ab985----3---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@e.ahmadi/three-replicas-of-rabbitmq-in-docker-swarm-with-nfs-shared-storage-e91e7cd32bf6?responsesOpen=true&sortBy=REVERSE_CHRON&source=author_recirc-----bd2fac5ab985----3---------------------a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2Fe91e7cd32bf6&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fthree-replicas-of-rabbitmq-in-docker-swarm-with-nfs-shared-storage-e91e7cd32bf6&source=-----bd2fac5ab985----3-----------------bookmark_preview----a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fp%2Fe91e7cd32bf6&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40e.ahmadi%2Fthree-replicas-of-rabbitmq-in-docker-swarm-with-nfs-shared-storage-e91e7cd32bf6&user=Ehsan+Ahmadi&userId=975f8e6b7ae9&source=-----e91e7cd32bf6----3-----------------clap_footer----a674c83c_d767_4e81_8d44_a0b1bcab5a55-------
-
https://medium.com/@mares.viktor/code-injection-via-python-sandbox-escape-how-i-got-a-shell-inside-a-network-c977c35a82de?source=read_next_recirc-----bd2fac5ab985----0---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@mares.viktor?source=read_next_recirc-----bd2fac5ab985----0---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@mares.viktor/code-injection-via-python-sandbox-escape-how-i-got-a-shell-inside-a-network-c977c35a82de?responsesOpen=true&sortBy=REVERSE_CHRON&source=read_next_recirc-----bd2fac5ab985----0---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2Fc977c35a82de&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40mares.viktor%2Fcode-injection-via-python-sandbox-escape-how-i-got-a-shell-inside-a-network-c977c35a82de&source=-----bd2fac5ab985----0-----------------bookmark_preview----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fp%2Fc977c35a82de&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40mares.viktor%2Fcode-injection-via-python-sandbox-escape-how-i-got-a-shell-inside-a-network-c977c35a82de&user=Viktor+Mares&userId=475b08319370&source=-----c977c35a82de----0-----------------clap_footer----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@ajaksecurity/how-to-become-a-successful-bug-bounty-hunter-in-2023-f3c1499959da?source=read_next_recirc-----bd2fac5ab985----1---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@ajaksecurity?source=read_next_recirc-----bd2fac5ab985----1---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@ajaksecurity/how-to-become-a-successful-bug-bounty-hunter-in-2023-f3c1499959da?responsesOpen=true&sortBy=REVERSE_CHRON&source=read_next_recirc-----bd2fac5ab985----1---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2Ff3c1499959da&operation=register&redirect=https%3A%2F%2Fajaksecurity.medium.com%2Fhow-to-become-a-successful-bug-bounty-hunter-in-2023-f3c1499959da&source=-----bd2fac5ab985----1-----------------bookmark_preview----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@anupamchugh/list/now-in-ai-handpicked-by-better-programming-b788e9676cd5?source=read_next_recirc-----bd2fac5ab985--------------------------------
-
https://medium.com/@blyum2007/list/marketing-35b53c961d59?source=read_next_recirc-----bd2fac5ab985--------------------------------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fp%2Ff3c1499959da&operation=register&redirect=https%3A%2F%2Fajaksecurity.medium.com%2Fhow-to-become-a-successful-bug-bounty-hunter-in-2023-f3c1499959da&user=Ajak+Cyber+security&userId=638e53981d1e&source=-----f3c1499959da----1-----------------clap_footer----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@s12deff/bypass-antivirus-with-fibers-code-execution-7ef089f4232?source=read_next_recirc-----bd2fac5ab985----0---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@s12deff?source=read_next_recirc-----bd2fac5ab985----0---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@s12deff/bypass-antivirus-with-fibers-code-execution-7ef089f4232?responsesOpen=true&sortBy=REVERSE_CHRON&source=read_next_recirc-----bd2fac5ab985----0---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2F7ef089f4232&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40s12deff%2Fbypass-antivirus-with-fibers-code-execution-7ef089f4232&source=-----bd2fac5ab985----0-----------------bookmark_preview----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/betterappsec/a-medium-dive-into-web-application-authentication-342d1d002a61?source=read_next_recirc-----bd2fac5ab985----1---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fp%2F7ef089f4232&operation=register&redirect=https%3A%2F%2Fmedium.com%2F%40s12deff%2Fbypass-antivirus-with-fibers-code-execution-7ef089f4232&user=S12+-+H4CK&userId=40bfd1206679&source=-----7ef089f4232----0-----------------clap_footer----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@betterappsec?source=read_next_recirc-----bd2fac5ab985----1---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/betterappsec?source=read_next_recirc-----bd2fac5ab985----1---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/betterappsec/a-medium-dive-into-web-application-authentication-342d1d002a61?responsesOpen=true&sortBy=REVERSE_CHRON&source=read_next_recirc-----bd2fac5ab985----1---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2F342d1d002a61&operation=register&redirect=https%3A%2F%2Fbetterappsec.com%2Fa-medium-dive-into-web-application-authentication-342d1d002a61&source=-----bd2fac5ab985----1-----------------bookmark_preview----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/bugbountywriteup/how-i-tried-harder-my-story-of-passing-the-oscp-866e18144bea?source=read_next_recirc-----bd2fac5ab985----2---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@giedrius.saulenas?source=read_next_recirc-----bd2fac5ab985----2---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/bugbountywriteup?source=read_next_recirc-----bd2fac5ab985----2---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/bugbountywriteup/how-i-tried-harder-my-story-of-passing-the-oscp-866e18144bea?responsesOpen=true&sortBy=REVERSE_CHRON&source=read_next_recirc-----bd2fac5ab985----2---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2F866e18144bea&operation=register&redirect=https%3A%2F%2Finfosecwriteups.com%2Fhow-i-tried-harder-my-story-of-passing-the-oscp-866e18144bea&source=-----bd2fac5ab985----2-----------------bookmark_preview----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fbetterappsec%2F342d1d002a61&operation=register&redirect=https%3A%2F%2Fbetterappsec.com%2Fa-medium-dive-into-web-application-authentication-342d1d002a61&user=James+Chiappetta&userId=9a9fa1f04e11&source=-----342d1d002a61----1-----------------clap_footer----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fbugbountywriteup%2F866e18144bea&operation=register&redirect=https%3A%2F%2Finfosecwriteups.com%2Fhow-i-tried-harder-my-story-of-passing-the-oscp-866e18144bea&user=Giedrius+Saulenas&userId=7633f0cdf40c&source=-----866e18144bea----2-----------------clap_footer----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/product-cybersecurity/3-tips-for-aligning-business-vision-to-cybersecurity-strategy-65de35dcb9d1?source=read_next_recirc-----bd2fac5ab985----3---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/@davidmatousek?source=read_next_recirc-----bd2fac5ab985----3---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/product-cybersecurity?source=read_next_recirc-----bd2fac5ab985----3---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/product-cybersecurity/3-tips-for-aligning-business-vision-to-cybersecurity-strategy-65de35dcb9d1?responsesOpen=true&sortBy=REVERSE_CHRON&source=read_next_recirc-----bd2fac5ab985----3---------------------31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fbookmark%2Fp%2F65de35dcb9d1&operation=register&redirect=https%3A%2F%2Fmedium.com%2Fproduct-cybersecurity%2F3-tips-for-aligning-business-vision-to-cybersecurity-strategy-65de35dcb9d1&source=-----bd2fac5ab985----3-----------------bookmark_preview----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
-
https://medium.com/?source=post_page-----bd2fac5ab985--------------------------------
-
https://medium.com/m/signin?actionUrl=https%3A%2F%2Fmedium.com%2F_%2Fvote%2Fproduct-cybersecurity%2F65de35dcb9d1&operation=register&redirect=https%3A%2F%2Fmedium.com%2Fproduct-cybersecurity%2F3-tips-for-aligning-business-vision-to-cybersecurity-strategy-65de35dcb9d1&user=David+Matousek&userId=aee3ee2ca65a&source=-----65de35dcb9d1----3-----------------clap_footer----31fd4bab_ddd9_470c_aed8_ca2b90ad6edf-------
- Show all
-