mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

689
comptes actifs

#iis

0 message0 participant0 message aujourd’hui
Harald Leithner<p><span class="h-card" translate="no"><a href="https://joomla.social/@joomla" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>joomla</span></a></span> maintainers are in progress to define the minimum requirements for <a href="https://joomla.social/tags/joomla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>joomla</span></a> 6. In question is <a href="https://joomla.social/tags/php" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>php</span></a> <a href="https://joomla.social/tags/mysql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mysql</span></a> <a href="https://joomla.social/tags/mariadb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mariadb</span></a> <a href="https://joomla.social/tags/postgresql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postgresql</span></a> <a href="https://joomla.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://joomla.social/tags/ngnix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngnix</span></a> <a href="https://joomla.social/tags/iis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iis</span></a> <br>What's your suggestion?</p>
benzogaga33 :verified:<p>BadIIS, le malware qui transforme les serveurs web IIS en passerelles malveillantes <a href="https://www.it-connect.fr/badiis-le-malware-qui-transforme-les-serveurs-web-iis-en-passerelles-malveillantes/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">it-connect.fr/badiis-le-malwar</span><span class="invisible">e-qui-transforme-les-serveurs-web-iis-en-passerelles-malveillantes/</span></a> <a href="https://mamot.fr/tags/ActuCybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActuCybersécurité</span></a> <a href="https://mamot.fr/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mamot.fr/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://mamot.fr/tags/IIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IIS</span></a></p>
SciPost Physics<p>New <a href="https://scipost.social/tags/openaccess" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openaccess</span></a> publication <a href="https://scipost.social/tags/SciPost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SciPost</span></a> <a href="https://scipost.social/tags/Physics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Physics</span></a> Codebases</p><p>HYPERTILING — a high performance Python library for the generation and visualization of hyperbolic lattices</p><p>Manuel Schrauth, Yanick Thurn, Florian Goth, Jefferson S. E. Portela, Dietmar Herdt, Felix Dusel<br>SciPost Phys. Codebases 34 (2024)<br><a href="https://scipost.org/SciPostPhysCodeb.34" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">scipost.org/SciPostPhysCodeb.3</span><span class="invisible">4</span></a></p><p><a href="https://scipost.social/tags/W%C3%BCrzburgUniversity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WürzburgUniversity</span></a> <a href="https://scipost.social/tags/IIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IIS</span></a> <a href="https://scipost.social/tags/UBC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UBC</span></a></p>
Der Entgegner (Aka Ratatöskr)<p>Das Verhängnis nahm seinen Lauf in Gestalt eines hastig gebastelten Update des <a href="https://troet.cafe/tags/wsus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wsus</span></a>, das im Konflikt zum zu schlichten SBS-Update-Servers stand. Der benutzte den IIS-7 fürs Deployment, der WSUS-Patch korrumpierte eine Reihe Rights und Ressourcen, woraufhin der IIS-7 nachhaltig beleidigt ausfiel. Im SBS2011 war der <a href="https://troet.cafe/tags/IIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IIS</span></a> aber Dreh- und Angelpunkt des ganzen Servers! Ohne ihn kein <a href="https://troet.cafe/tags/OWA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWA</span></a>, kein Autoassignment, kein Cert-Deployment und kein WSUS! Das hinterhältige war: Das Update installierte sich 3/4</p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> vs <a href="https://fosstodon.org/tags/IIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IIS</span></a> vs <a href="https://fosstodon.org/tags/Nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nginx</span></a>: An In-depth Comparison of Web Servers </p><p><a href="https://www.linuxcareers.com/resources/blog/2023/07/apache-vs-iis-vs-nginx-an-in-depth-comparison-of-web-servers/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linuxcareers.com/resources/blo</span><span class="invisible">g/2023/07/apache-vs-iis-vs-nginx-an-in-depth-comparison-of-web-servers/</span></a></p>
Joel Carnat ♑ 🤪<p><span class="h-card"><a href="https://bsd.network/@ledeuns" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ledeuns</span></a></span> c'est parce que c'est pas dans <a href="https://piou.foolbazar.eu/tags/exchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exchange</span></a> mais dans <a href="https://piou.foolbazar.eu/tags/iis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iis</span></a> !!! :)</p>
Redhotcyber<p>Lazarus utilizza Microsoft Internet Information Services (IIS) per distribuire malware</p><p>L’AhnLab Security Emergency Response Center (<a href="https://mastodon.bida.im/tags/ASEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASEC</span></a>) riferisce che il gruppo di hacker nordcoreani <a href="https://mastodon.bida.im/tags/Lazarus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lazarus</span></a> Group sta prendendo di mira le versioni <a href="https://mastodon.bida.im/tags/vulnerabili" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabili</span></a> dei server <a href="https://mastodon.bida.im/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> Internet Information Services (<a href="https://mastodon.bida.im/tags/IIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IIS</span></a>) per distribuire <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> sui <a href="https://mastodon.bida.im/tags/sistemi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sistemi</span></a> bersaglio.</p><p>Secondo AhnLab Securit, il gruppo utilizza un metodo di sideload DLL (<a href="https://mastodon.bida.im/tags/DLL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DLL</span></a> <a href="https://mastodon.bida.im/tags/Sideloading" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sideloading</span></a>) per lanciare <a href="https://mastodon.bida.im/tags/payload" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>payload</span></a> arbitrari. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/lazarus-utilizza-microsoft-internet-information-services-iis-per-distribuire-malware/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/lazarus-u</span><span class="invisible">tilizza-microsoft-internet-information-services-iis-per-distribuire-malware/</span></a></p>
Redhotcyber<p>Un nuovo malware dal nome Frebniss consente ai criminali informatici di hackerare Microsoft IIS</p><p><a href="https://mastodon.bida.im/tags/Frebniis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Frebniis</span></a> è stato scoperto dal <a href="https://mastodon.bida.im/tags/Symantec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Symantec</span></a> Threat Hunter Team, che ha riferito che aggressori sconosciuti stanno attualmente utilizzando il <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> contro una serie di obiettivi taiwanesi.</p><p>Negli attacchi visti da Symantec, gli hacker criminali hanno utilizzato una funzionalità <a href="https://mastodon.bida.im/tags/IIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IIS</span></a> chiamata Failed Request Event Buffering (<a href="https://mastodon.bida.im/tags/FREB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FREB</span></a>), responsabile della raccolta dei <a href="https://mastodon.bida.im/tags/metadati" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>metadati</span></a> delle richieste (indirizzo <a href="https://mastodon.bida.im/tags/IP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IP</span></a>, intestazioni <a href="https://mastodon.bida.im/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a>, <a href="https://mastodon.bida.im/tags/cookie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cookie</span></a> ). </p><p>Il suo scopo è aiutare gli amministratori del server a risolvere i codici di stato HTTP imprevisti o i problemi di elaborazione delle richieste. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/un-nuovo-malware-dal-nome-frebniss-consente-ai-criminali-informatici-di-hackerare-microsoft-iis/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/un-nuovo-</span><span class="invisible">malware-dal-nome-frebniss-consente-ai-criminali-informatici-di-hackerare-microsoft-iis/</span></a></p>
Fabian Bader<p>IIS modules: The evolution of web shells and how to detect them&nbsp; - Microsoft Security Blog</p><p><a href="https://infosec.exchange/tags/webshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webshell</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/mde" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mde</span></a> <a href="https://infosec.exchange/tags/iis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iis</span></a> <a href="https://infosec.exchange/tags/detection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>detection</span></a> <a href="https://infosec.exchange/tags/kql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kql</span></a></p><p><a href="http://www.microsoft.com/en-us/security/blog/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/?WT.mc_id=AZ-MVP-5004810" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">http://www.</span><span class="ellipsis">microsoft.com/en-us/security/b</span><span class="invisible">log/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/?WT.mc_id=AZ-MVP-5004810</span></a></p>