Behavioral task
behavioral1
Sample
6126beb0bafdc0b143555357bd2c1e971c606e68cfaddde14700cf4aa62a1d95.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6126beb0bafdc0b143555357bd2c1e971c606e68cfaddde14700cf4aa62a1d95.pdf
Resource
win10v2004-20240221-en
General
-
Target
6126beb0bafdc0b143555357bd2c1e971c606e68cfaddde14700cf4aa62a1d95
-
Size
31.4MB
-
MD5
d724571323c6718ce3e9eca843f9e9e9
-
SHA1
20b7be4585c16cef76c3697e8fcba5737c5043fe
-
SHA256
6126beb0bafdc0b143555357bd2c1e971c606e68cfaddde14700cf4aa62a1d95
-
SHA512
80570d07a554895e698d0f120104ac4c9b312452f8f9ac5583684f5acd5e4f3bb8c53fc297789148c79c2cff4022cc7271016a97deb7ca6a67a6d003c67b8c25
-
SSDEEP
786432:9rUJbs/ySjAOTIKXrkMpZ56g1DzfTtJ/t5/:poQKSkCpDMqRJ7
Malware Config
Signatures
Files
-
6126beb0bafdc0b143555357bd2c1e971c606e68cfaddde14700cf4aa62a1d95.pdf
-
http://dnb.d-nb.de/
-
https://www.rheinwerk-verlag.de/
-
https://heise.de/-3803285
-
https://en.wikipedia.org/wiki/Cyberwarfare
-
https://zerodium.com/
-
https://cve.mitre.org/
-
https://nvd.nist.gov/vuln
-
https://www.exploit-db.com/
-
https://www.rapid7.com/db
-
https://www.cvedetails.com/
-
https://de.wikipedia.org/wiki/Vorbereiten_des_Aussp%C3%A4hens_und_Abfangens_von_Daten
-
https://www.iso.org/
-
https://de.wikipedia.org/wiki/ISO/IEC_27001
-
https://de.wikipedia.org/wiki/ISO/IEC_27002
-
https://www.bsi.bund.de/
-
https://www.bsi.bund.de/DE/Themen/ITGrundschutz/ITGrundschutzKompendium/itgrundschutzKompendium_node.html
-
https://www.bsi-fuer-buerger.de/
-
https://bundeskriminalamt.at/306
-
https://www.onlinesicherheit.gv.at/
-
https://www.onlinesicherheit.gv.at/service/publikationen/sicherheitsberichte
-
https://www.vbs.admin.ch/de/verteidigung/schutz-vor-cyber-angriffen.html
-
https://www.eda.admin.ch/eda/de/home/aussenpolitik/sicherheitspolitik.html
-
https://www.cert-verbund.de/
-
https://cert.at/
-
https://www.govcert.admin.ch/
-
https://www.switch.ch/security
-
https://www.us-cert.gov/ncas/alerts
-
http://blackarch.org/
-
https://www.kali.org/
-
https://balena.io/etcher
-
https://www.kali.org/downloads
-
https://www.microsoft.com/en-us/download/details.aspx?id=11533
-
http://cdimage.kali.org/
-
https://en.wikipedia.org/wiki/Web_of_trust
-
https://docs.kali.org/introduction/download-official-kali-linux-images
-
https://www.kali.org/docs/general-use/xfce-faq
-
https://www.kali.org/docs/usb/kali-linux-live-usb-persistence/
-
https://aws.amazon.com/marketplace/pp/B01M26MMTT
-
https://www.debian.org/releases/buster/installmanual
-
https://4sysops.com/archives/native-nat-in-windows-10-hyper-v-using-a-nat-virtual-switch
-
https://www.kali.org/news/wsl2-and-kali
-
https://www.offensive-security.com/kali-linux-arm-images
-
https://www.balena.io/etcher
-
https://docs.kali.org/policy/kali-linux-relationship-with-debian
-
https://pentestbox.org/
-
https://conemu.github.io/
-
https://tools.pentestbox.org/
-
https://www.vulnhub.com/
-
https://sourceforge.net/projects/metasploitable
-
https://metasploit.help.rapid7.com/docs/metasploitable-2-exploitability-guide
-
https://www.stuffwithaurum.com/2015/06/14/metasploitable-2-walkthrough-an-exploitation-guide
-
https://github.com/rapid7/metasploitable3/wiki
-
https://vagrantup.com/
-
https://packer.io/
-
https://github.com/rapid7/metasploitable3
-
https://github.com/rapid7/metasploitable3/blob/master/README.md
-
https://chocolatey.org/
-
https://blog.techygeekshome.info/2014/10/windows-server-2008-r2-evaluation-product-keys
-
https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities
-
https://github.com/rapid7/metasploitable3/wiki/Configuration
-
https://www.youtube.com/user/webpwnized
-
https://github.com/epinna/weevely3/wiki
-
https://two06.blogspot.co.at/2016/12/metasploitable-3-walkthrough.html
-
https://learn.thehackerlab.co/walkthroughs/metasploitable-3-ubuntu/quickstart
-
https://www.thomaslaurenson.com/blog/2018/07/08/metasploitable3-pentesting-the-ubuntu-linux-version-part1
-
https://www.thomaslaurenson.com/blog/2018/07/09/metasploitable3-pentesting-the-ubuntu-linux-version-part2
-
https://bkimminich.gitbooks.io/pwning-owasp-juice-shop/content
-
https://pwning.owasp-juice.shop/appendix/solutions.html
-
https://nmap.org/
-
https://nmap.org/book
-
https://hpi.de/news/jahrgaenge/2016/hpi-wissenschaftler-ermitteln-die-zehn-meistgenutzten-deutschsprachigen-passwoerter.html
-
http://foofus.net/goons/jmk/medusa/medusa-compare.html
-
http://wapiti.sourceforge.net/
-
https://whatcms.org/
-
https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
-
https://www.ssllabs.com/ssltest
-
https://whois.com/
-
https://www.wireshark.org/download.html
-
https://wiki.wireshark.org/CaptureSetup/CapturePrivileges
-
https://www.wireshark.org/docs
-
https://wiki.wireshark.org/FrontPage
-
https://www.microsoft.com/en-us/download/4865
-
https://blogs.technet.microsoft.com/messageanalyzer
-
https://channel9.msdn.com/Blogs/Taste-of-Premier/MessageAnalyzer
-
https://www.telerik.com/fiddler
-
http://www.tcpdump.org/
-
https://www.winpcap.org/windump
-
https://nmap.org/ncat
-
https://en.wikipedia.org/wiki/Netcat#Examples
-
http://www.dest-unreach.org/socat
-
https://technostuff.blogspot.co.at/2008/10/some-useful-socat-commands.html
-
https://sparta.secforce.com/
-
http://openvas.org/
-
https://en.wikipedia.org/wiki/CVSS
-
https://docs.greenbone.net/
-
https://hackertarget.com/nessus-openvas-nexpose-vs-metasploitable
-
https://www.seccubus.com/
-
https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers
-
http://osx.metasploit.com/
-
https://github.com/rapid7/metasploit-framework/issues/11560
-
http://www.fastandeasyhacking.com/
-
https://github.com/EmpireProject/Empire/wiki
-
https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass
-
https://github.com/zerosum0x0/koadic.git
-
https://pentestit.de/lets-encrypt-zertifikate-fuer-koadic-nutzen
-
https://github.com/trustedsec/social-engineer-toolkit
-
https://www.rheinwerk-verlag.de/konto/login-registrieren
-
https://github.com/elceef/dnstwist
-
https://getgophish.com/
-
https://www.lucysecurity.com/de
-
https://www.phishingfrenzy.com/
-
https://github.com/securestate/king-phisher
-
https://github.com/tatanus/SPF
-
https://portswigger.net/burp
-
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
-
https://www.groovypost.com/howto/bios-uefi-setup-guide-boot-from-cd-dvd-usb-drive-sd-card
-
https://serverfault.com/questions/770996
-
http://www.nirsoft.net/utils/vault_password_view.html
-
https://www.bsi.bund.de/DE/Themen/Cyber-Sicherheit/Dienstleistungen/IT-Forensik/forensik_node.html
-
https://github.com/linux-apfs/linux-apfs
-
https://www.paragon-software.com/de/home/apfs-linux
-
https://twocanoes.com/secureboot-imac-pro
-
https://www.top-password.com/reset-windows-password.html
-
https://docs.microsoft.com/en-us/microsoft-desktop-optimization-pack/dart-v10
-
https://superuser.com/questions/767239
-
https://security.stackexchange.com/questions/157922
-
https://heise.de/-4543170
-
https://github.com/Aorimn/dislocker
-
https://www.linuxuprising.com/2019/04/how-to-mount-bitlocker-encrypted.html
-
https://lifehacker.com/1830289471
-
https://www.passware.com/
-
https://www.fileformat.info/tool/hash.htm
-
https://shattered.io/
-
http://project-rainbowcrack.com/
-
https://hashkiller.io/verify
-
https://github.com/danielmiessler/SecLists
-
http://www.openwall.com/john
-
https://hashcat.net/
-
https://hashcat.net/hashcat
-
https://hashcat.net/hashcat/
-
https://onetimesecret.com/
-
https://github.com/onetimesecret/onetimesecret
-
https://www.routerpasswords.com/
-
https://routerkeygen.github.io/
-
https://haveibeenpwned.com/
-
https://hashcat.net/forum/thread-7717.html
-
https://github.com/ZerBea/hcxdumptool
-
https://github.com/ZerBea/hcxtools
-
https://github.com/hashcat/hashcat
-
https://github.com/sohelzerdoumi/StKeys.git
-
https://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/
-
https://github.com/sporkbomb/wifi-opener/tree/master/3WebCube
-
https://security.stackexchange.com/questions/210389
-
https://www.krackattacks.com/
-
https://github.com/vanhoefm/krackattacks-test-ap-ft
-
https://github.com/OpenSecurityResearch/hostapd-wpe
-
https://gitlab.com/kalilinux/packages/hostapd-wpe
-
https://hakshop.com/products/wifi-pineapple
-
https://pwnagotchi.ai/intro/#how-does-pwnagotchi-work
-
https://github.com/evilsocket/pwnagotchi/releases
-
https://www.factoryforward.com/pi-zero-w-headless-setup-windows10-rndis-driver-issue-resolved
-
https://pwnagotchi.ai/community
-
https://hashcat.net/cap2hccapx
-
https://github.com/greatscottgadgets/ubertooth
-
https://www.ellisys.com/products/bex400
-
https://github.com/hexway/apple_bleee
-
https://github.com/mikeryan/btcrack
-
https://lacklustre.net/bluetooth/crackle-sample.tgz
-
https://github.com/mikeryan/crackle
-
https://www.armis.com/
-
https://www.gnuradio.org/
-
https://www.rtl-sdr.com/
-
https://greatscottgadgets.com/hackrf
-
http://hackrfblue.com/
-
https://www.nuand.com/
-
https://greatscottgadgets.com/yardstickone
-
http://www.nooelec.com/
-
https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads
-
https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1
-
https://github.com/gentilkiwi/mimikatz/tree/master/mimikatz
-
https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Downloads
-
https://ducktoolkit.com/
-
https://github.com/hak5darren/USB-Rubber-Ducky/tree/master/ducky-flasher
-
https://www.arduino.cc/en/Main/Software
-
http://digistump.com/package_digistump_index.json
-
https://github.com/CedArctic/digiQuack/releases
-
https://github.com/mame82/duck2spark
-
https://wiki.bashbunny.com/
-
https://github.com/hak5/bashbunny-wiki/blob/master/payload_development.md
-
https://www.hak5.org/gear/bash-bunny/docs
-
https://github.com/hak5/bashbunny-payloads/tree/master/payloads/library
-
https://github.com/mame82/P4wnP1_aloa/releases/download/v0.1.0-alpha2/kali-linux-v0.1.0-alpha2-rpi0w-nexmon-p4wnp1-aloa.img.xz
-
https://blog.botfrei.de/2017/03/firewall-fuer-den-usb-anschluss
-
https://www.irongeek.com/downloads/Malicious%20USB%20Devices.pdf
-
https://github.com/pmsosa/duckhunt
-
https://github.com/JLospinoso/beamgun
-
http://www.owasp.org/
-
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf
-
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
-
https://www.rheinwerk-verlag.de/das-team/verlagsleitung
-
https://www.jusline.at/abfrageservices/handelsregisterauszug
-
https://handelsregister-auszug.de/
-
http://www.firmenabc.at/
-
https://www.paterva.com/
-
https://docs.paterva.com/en/developer-portal
-
https://www.elevenpaths.com/labstools/foca
-
https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2019
-
http://www.getgophish.com/
-
https://gophish.gitbooks.io/user-guide
-
https://github.com/Veil-Framework/Veil
-
http://angusj.com/resourcehacker
-
http://blog.scriptmonkey.eu/playing-with-autoplay
-
https://de.wikipedia.org/wiki/OSI-Modell
-
http://www.rheinwerk-verlag.de/
-
https://www.icann.org/resources/pages/listing-2012-02-25-en
-
http://get-simple.info/
-
https://sourceforge.net/projects/wampserver/
-
https://ssd-disclosure.com/ssd-advisory-getcms-unauthenticated-remote-code-execution/
-
https://github.com/rasta-mouse/Sherlock
-
https://github.com/gentilkiwi/mimikatz
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/user-rights-assignment
-
https://www.microsoft.com/en-us/download/details.aspx?id=46899
-
https://blogs.msdn.microsoft.com/laps/2015/06/01/laps-and-password-storage-in-clear-text-in-ad
-
https://support.microsoft.com/de-de/help/2871997/microsoft-security-advisory-update-to-improve-credentials-protection-a
-
https://www.microsoft.com/en-us/cloud-platform/windows-server-security
-
https://cloudblogs.microsoft.com/windowsserver/2017/08/22/now-available-windows-server-2016-security-guide/
-
https://technet.microsoft.com/en-us/security/rss/advisory
-
https://blogs.technet.microsoft.com/secguide/2016/07/28/security-compliance-manager-4-0-now-available-for-download
-
https://www.microsoft.com/en-us/download/details.aspx?id=55319
-
https://technet.microsoft.com/de-de/library/2009.09.sdadminholder.aspx
-
https://msdn.microsoft.com/de-de/library/windows/desktop/aa379570(v=vs.85).aspx
-
https://blogs.technet.microsoft.com/askds/2008/04/18/the-security-descriptor-definition-language-of-love-part-1
-
https://blogs.technet.microsoft.com/askds/2008/05/07/the-security-descriptor-definition-language-of-love-part-2
-
https://github.com/csababarta/ntdsxtract
-
https://github.com/libyal/libesedb
-
https://github.com/PowerShellMafia/PowerSploit
-
https://blogs.technet.microsoft.com/mempson/2010/12/01/group-policy-client-side-extension-list
-
https://technet.microsoft.com/en-us/library/cc780332(WS.10).aspx
-
https://technet.microsoft.com/en-us/library/cc772815(v=ws.10).aspx
-
https://blogs.technet.microsoft.com/russellt/2016/01/13/identifying-clear-text-ldap-binds-to-your-dcs/
-
https://www.ampliasecurity.com/research/windows-credentials-editor
-
https://github.com/gentilkiwi/mimikatz/releases
-
https://adsecurity.org/?page_id=1821
-
https://github.com/BloodHoundAD/BloodHound
-
https://byt3bl33d3r.github.io/automating-the-empire-with-the-death-star-getting-domain-admin-with-a-push-of-a-button.html
-
https://github.com/MichaelGrafnetter/DSInternals
-
https://hashes.com/decrypt/basic
-
https://support.microsoft.com/de-de/lifecycle
-
https://technet.microsoft.com/en-us/dn785092.aspx
-
https://gallery.technet.microsoft.com/Reset-the-krbtgt-account-581a9e51
-
https://www.microsoft.com/de-de/cloud-platform/advanced-threat-analytics
-
https://gallery.technet.microsoft.com/ATA-Playbook-ef0a8e38
-
https://access.redhat.com/discussions/3106621
-
https://access.redhat.com/security/security-updates
-
https://usn.ubuntu.com/usn
-
http://people.canonical.com/~ubuntu-security/cve/main.html
-
https://access.redhat.com/articles/2475321
-
https://auth.livepatch.canonical.com/
-
https://de.wikipedia.org/wiki/Google_Authenticator#Schwachstellen
-
https://www.zdnet.com/article/google-could-have-fixed-2fa-code-stealing-flaw-in-authenticator-app-years-ago
-
https://serverfault.com/questions/629883
-
https://sysconfig.org.uk/two-factor-authentication-with-ssh.html
-
https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-16-04
-
https://authy.com/
-
https://fedoraproject.org/wiki/EPEL
-
http://open-source.arkoon.net/kernel/kernel_net.png
-
https://fedoraproject.org/wiki/FirewallD
-
https://www.firewalld.org/
-
https://wiki.ubuntuusers.de/ufw
-
https://help.ubuntu.com/18.04/serverguide/firewall.html
-
https://wiki.ubuntu.com/UncomplicatedFirewall
-
https://fedoraproject.org/wiki/Security_context
-
https://wiki.centos.org/TipsAndTricks/SelinuxBooleans
-
https://bugs.launchpad.net/
-
https://wiki.ubuntu.com/AppArmor
-
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/AppArmorProfiles
-
https://letsencrypt.org/
-
https://mozilla.github.io/server-side-tls/ssl-config-generator
-
https://dev.mysql.com/downloads/repo
-
https://downloads.mariadb.org/mariadb/repositories
-
https://crackstation.net/
-
https://dev.mysql.com/doc/refman/8.0/en/privileges-provided.html
-
https://kofler.info/postfix-dovecot-spamassassin-spam-in-den-junk-folder-verschieben
-
https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system_comparison
-
https://www.linux-magazin.de/ausgaben/2015/10/host-based-ids
-
https://cisofy.com/pricing
-
https://cisofy.com/downloads/lynis
-
https://ispprotect.de/
-
https://snort.org/
-
https://github.com/shirkdog/pulledpork
-
http://manual-snort-org.s3-website-us-east-1.amazonaws.com/
-
https://www.sernet.de/de/samba
-
https://www.samba.org/samba/security/CVE-2017-7494.html
-
https://technet.microsoft.com/de-de/library/cc732880(v=ws.11).aspx
-
https://www.samba.org/samba/docs/man/manpages-3/vfs_full_audit.8.html
-
https://www.shodan.io/
-
https://nmap.org/nsedoc/scripts/smb-vuln-cve-2017-7494.html
-
https://bugzilla.samba.org/show_bug.cgi?id=12572
-
https://www.cvedetails.com/vulnerability-list/vendor_id-102/Samba.html
-
https://nmap.org/book/nse.html
-
https://nmap.org/nsedoc/index.html
-
https://nmap.org/nsedoc/scripts/samba-vuln-cve-2012-1182.html
-
http://www.netcraft.com/
-
https://bitly.com/
-
http://tinyurl.com/
-
http://bit.ly/2pmq38C
-
http://beefproject.com/
-
https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
-
https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
-
http://mysite.com/index.php?include=http://hacker.com/badfile.txt
-
http://10.52.200.26/websec/file_inclusion/rfi.php?include=http://10.52.210.210/cmd.txt
-
https://github.com/commixproject/commix
-
https://github.com/lanmaster53/recon-ng
-
https://gist.github.com/jeremybuis
-
https://github.com/frohoff/ysoserial
-
https://www.vulnhub.com/entry/dc-9,412
-
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md
-
https://www.owasp.org/
-
https://www.cvedetails.com/vulnerability-list/vendor_id-45/product_id-66/version_id-142323/Apache-Http-Server-2.2.22.html
-
http://hostname.com/
-
https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series
-
https://github.com/SpiderLabs/ModSecurity
-
http://modsecurity.org/crs
-
http://modsecurity.org/commercial-rules.html
-
https://owasp.org/www-pdf-archive/Best_Practices_WAF_v105.en.pdf
-
https://www.owasp.org/index.php/Appendix_A:_Testing_Tools
-
https://www.owasp.org/index.php/Fuzzing#Fuzzing_tools
-
https://sourceforge.net/projects/minishare/files/OldFiles/minishare-1.4.1-nl.exe/download
-
https://www.immunityinc.com/products/debugger
-
https://msdn.microsoft.com/en-us/library/bb288454.aspx
-
https://meltdownattack.com/
-
https://github.com/IAIK/meltdown
-
https://spectreattack.com/spectre.pdf
-
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_lost-or-broken.html
-
https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-welcome.html
-
https://docs.aws.amazon.com/cli/latest/reference/s3/index.html
-
https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html
-
https://stackoverflow.com/questions/28247821
-
https://stackoverflow.com/questions/7143514
-
https://digi.ninja/projects/bucket_finder.php
-
https://www.darknet.org.uk/2017/09/awsbucketdump-aws-s3-security-scanning-tool
-
https://certstream.calidog.io/
-
https://github.com/eth0izzle/bucket-stream
-
https://owncloud.com/
-
https://nextcloud.com/
-
https://hub.docker.com/_/owncloud
-
https://hub.docker.com/_/nextcloud
-
https://docs.nextcloud.com/server/17/admin_manual/installation/source_installation.html
-
https://docs.nextcloud.com/server/17/admin_manual/configuration_files/encryption_configuration.html
-
https://docs.nextcloud.com/server/17/admin_manual/configuration_files/external_storage_configuration_gui.html
-
https://scan.owncloud.com/
-
https://scan.nextcloud.com/
-
https://github.com/51x/OwnCloudCrack
-
https://doc.owncloud.com/server/admin_manual/configuration/server/security/brute_force_protection.html
-
https://docs.microsoft.com/de-de/azure/active-directory/active-directory-whatis
-
https://docs.microsoft.com/de-de/azure/active-directory/connect/active-directory-aadconnect
-
https://docs.microsoft.com/de-de/azure/active-directory/connect/active-directory-aadconnect-prerequisites
-
https://azure.microsoft.com/de-de/pricing/details/active-directory
-
https://admin.microsoft.com/Adminportal/Home?source=applauncher#/users
-
https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview
-
https://myapps.microsoft.com/
-
https://docs.microsoft.com/de-de/azure/active-directory/active-directory-saas-tutorial-list
-
https://docs.microsoft.com/de-de/azure/active-directory/active-directory-application-proxy-get-started
-
https://securescore.office.com/
-
https://aka.ms/MFASetup
-
https://account.activedirectory.windowsazure.com/proofup.aspx
-
https://technet.microsoft.com/de-de/library/jj984289(v=exchg.160).aspx
-
https://technet.microsoft.com/de-de/library/mt614245.aspx
-
https://portal.office.com/adminportal
-
https://portal.azure.com/
-
https://docs.microsoft.com/de-de/intune/introduction-intune
-
https://docs.microsoft.com/de-de/intune/app-protection-policy
-
https://docs.microsoft.com/de-de/cloud-app-security/editions-cloud-app-security-o365
-
https://protection.office.com/
-
https://portal.cloudappsecurity.com/
-
https://portal.office.com/
-
https://portal.office.com/adminportal/home
-
https://outlook.office365.com/ecp
-
https://admin.protection.outlook.com/quarantine
-
https://technet.microsoft.com/de-de/library/mt734386(v=exchg.150).aspx
-
https://www.microsoftvolumelicensing.com/DocumentSearch.aspx?Mode=3&DocumentTypeId=31
-
https://www.microsoft.com/de-de/trustcenter
-
http://www.cvedetails.com/
-
https://www.cvedetails.com/top-50-products.php?year=2019
-
https://www.cvedetails.com/product/19997/Google-Android.html?vendor_id=1224
-
https://source.android.com/security/bulletin
-
https://www.bsi-fuer-buerger.de/BSIFB/DE/Service/Buerger-CERT/Newsletter/bestellen/newsletter_bestellen_node.html
-
https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf
-
https://github.com/Akdeniz/google-play-crawler
-
https://github.com/matlink/gplaycli
-
https://framagit.org/tuxicoman/googleplaydownloader
-
https://ibotpeaches.github.io/Apktool
-
https://github.com/pxb1988/dex2jar
-
http://jd.benow.ca/
-
https://github.com/MobSF/Mobile-Security-Framework-MobSF
-
https://github.com/MobSF/Mobile-Security-Framework-MobSF/wiki/1.-Documentation
-
https://source.android.com/security/bulletin/index.html
-
https://www.icloud.com/find/
-
https://myaccount.google.com/find-your-phone
-
https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS/BSI-CS_109.pdf
-
https://appleid.apple.com/account/manage
-
https://webauthn.io/
-
https://github.com/RUB-NDS/PRET
-
https://github.com/NullArray/AutoSploit
-
https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml
-
https://www.rabbitmq.com/
-
https://mosquitto.org/download
-
http://slproweb.com/products/Win32OpenSSL.html
-
http://www.iosrjournals.org/iosr-jece/papers/NCNS/08-12.pdf
-
https://jopee.wordpress.com/6lowpan-gateway
-
https://github.com/riverloopsec/killerbee
-
https://research.kudelskisecurity.com/2017/11/01/zigbee-security-basics-part-1
-
https://github.com/matthijskooijman/arduino-lmic
-
https://github.com/mcci-catena/arduino-lmic
-
https://repository.tudelft.nl/islandora/object/uuid:87730790-6166-4424-9d82-8fe815733f1e/datastream/OBJ/download
-
https://play.google.com/store/apps/details?id=at.mroland.android.apps.nfctaginfo
-
https://github.com/adafruit/Adafruit-PN532
-
http://www.legic.com/de/technologieplattform/leser-ics/sm-4200
-
http://www.legic.com/de/technologieplattform/leser-ics/sm-6300
-
https://mosquitto.org/
-
https://activemq.apache.org/
-
https://qpid.apache.org/
-
https://en.wikipedia.org/wiki/Constrained_Application_Protocol
-
http://www.thingstud.io/
-
https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-mqtt-support
-
https://www.mongodb.com/cloud/atlas
-
https://www.cloudamqp.com/
-
https://espressif.com/sites/default/files/documentation/0a-esp8266ex_datasheet_en.pdf
-
https://espressif.com/sites/default/files/documentation/esp32_datasheet_en.pdf
-
https://en.wikipedia.org/wiki/The_Power_of_10:_Rules_for_Developing_Safety-Critical_Code
-
https://kofler.info/
-
https://fh-joanneum.at/hochschule/person/klaus-gebeshuber
-
https://www.hackner-security.com/
-
https://pentestit.de/
-
https://www.linkedin.com/in/markus-widl
-
http://www.aignerdevelopment.com/
-
https://www.kania-online.de/
-
https://www.rheinwerk-verlag.de/4944
- Show all
-