u/secsecseec

▲ 4 r/ytu

Siber Güvenlik Dikey Uzmanlık Eğitimi

Herkese merhaba,

Özellikle bilgisayar mühendisliği öğrencilerinin ilgisini çekebileceğini düşündüğümüz bir süreç başlatıyoruz. Tabii ki sadece CENG öğrencilerine değil, siber güvenlik alanına gerçekten ilgi duyan herkese açık.

Milenium Akademi olarak “OwlCamp” adını verdiğimiz dikey uzmanlık odaklı bir siber güvenlik kampı hazırlıyoruz.

Bu süreçte amacımız insanları aylarca sadece temel konularda tutmak değil. Temelden başlayıp kısa sürede gerçek dünya senaryolarına, pratik çalışmalara ve teknik uzmanlaşmaya geçmek istiyoruz.

Biz burada sadece tool, payload veya hazır komut öğretmeyi hedeflemiyoruz. Asıl amacımız saldırı mantığını, problem çözme bakış açısını ve gerçek dünyada nasıl düşünülmesi gerektiğini öğretmek.

Kamp boyunca:

- haftada 4 gün eğitim,

- haftada 1 gün herkese açık ücretsiz yayın,

- red team bakış açısı,

- sosyal mühendislik,

- malware / exploit development,

- bug bounty tarafında teknik yönlendirme,

- Slack topluluğu üzerinden öğrenciler ve eğitmenlerle network

gibi başlıklar olacak.

Kısacası sadece ders izlenen bir yapı değil; insanların birlikte öğrendiği, soru sorduğu, pratik yaptığı ve sektöre daha bilinçli hazırlanabildiği bir topluluk kurmaya çalışıyoruz.

İncelemek isteyenler:

https://mileniumakademi.com

Teşekkürler.

reddit.com
u/secsecseec — 2 days ago
▲ 2 r/ODTU

Siber Güvenlik Dikey Uzmanlık Eğitimi

Herkese merhaba,

Özellikle bilgisayar mühendisliği öğrencilerinin ilgisini çekebileceğini düşündüğümüz bir süreç başlatıyoruz. Tabii ki sadece CENG öğrencilerine değil, siber güvenlik alanına gerçekten ilgi duyan herkese açık.

Milenium Akademi olarak “OwlCamp” adını verdiğimiz dikey uzmanlık odaklı bir siber güvenlik kampı hazırlıyoruz.

Bu süreçte amacımız insanları aylarca sadece temel konularda tutmak değil. Temelden başlayıp kısa sürede gerçek dünya senaryolarına, pratik çalışmalara ve teknik uzmanlaşmaya geçmek istiyoruz.

Biz burada sadece tool, payload veya hazır komut öğretmeyi hedeflemiyoruz. Asıl amacımız saldırı mantığını, problem çözme bakış açısını ve gerçek dünyada nasıl düşünülmesi gerektiğini öğretmek.

Kamp boyunca:

- haftada 4 gün eğitim,

- haftada 1 gün herkese açık ücretsiz yayın,

- red team bakış açısı,

- sosyal mühendislik,

- malware / exploit development,

- bug bounty tarafında teknik yönlendirme,

- Slack topluluğu üzerinden öğrenciler ve eğitmenlerle network

gibi başlıklar olacak.

Kısacası sadece ders izlenen bir yapı değil; insanların birlikte öğrendiği, soru sorduğu, pratik yaptığı ve sektöre daha bilinçli hazırlanabildiği bir topluluk kurmaya çalışıyoruz.

İncelemek isteyenler:

https://mileniumakademi.com

Teşekkürler.

u/secsecseec — 2 days ago

LID / Linux Integrity Drift

Hello again, I’m azqzazq1, a cybersecurity researcher.

My previous research, SunnyDayBPF, was recently featured by Ollie Whitehouse, CTO at the UK NCSC, in the Cyber Defence Analysis weekly summary.

Now I’m working on a new low-level Linux security research idea and I’d really like to hear opinions from people interested in eBPF, LSMs, AppArmor, and Linux hardening.

While spending more time with BPF internals, I noticed an interesting trust-boundary problem.

At a high level, the LSM framework prevents one LSM from simply overriding another LSM’s deny decision. However, eBPF tracing mechanisms can operate outside that LSM decision flow. This creates an interesting gap when combined with pathname-based MAC enforcement.

The research explores whether pre-LSM pathname manipulation through eBPF can cause AppArmor to evaluate a different path than the one originally requested by the user process.

In other words:

Can the security decision remain technically “valid” while the observed enforcement target is shifted before the LSM check?

I’m currently calling this research:

LID — Linux Integrity Drift

The focus is not “turning off AppArmor”, but understanding how kernel tracing, pathname-based access control, and security enforcement assumptions can drift from each other under specific conditions.

I’d love to hear thoughts from people working on Linux security, eBPF, AppArmor, LSM internals, or runtime detection.

Security assumptions killing all the ecosystem.

reddit.com
u/secsecseec — 4 days ago

LID / Linux Is Dying

Hello again, I’m azqzazq1, a cybersecurity researcher.

My previous research, SunnyDayBPF, was recently featured by Ollie Whitehouse, CTO at the UK NCSC, in the Cyber Defence Analysis weekly summary.

Now I’m working on a new low-level Linux security research idea and I’d really like to hear opinions from people interested in eBPF, LSMs, AppArmor, and Linux hardening.

While spending more time with BPF internals, I noticed an interesting trust-boundary problem.

At a high level, the LSM framework prevents one LSM from simply overriding another LSM’s deny decision. However, eBPF tracing mechanisms can operate outside that LSM decision flow. This creates an interesting gap when combined with pathname-based MAC enforcement.

The research explores whether pre-LSM pathname manipulation through eBPF can cause AppArmor to evaluate a different path than the one originally requested by the user process.

In other words:

Can the security decision remain technically “valid” while the observed enforcement target is shifted before the LSM check?

I’m currently calling this research:

LID — Linux Integrity Drift

The focus is not “turning off AppArmor”, but understanding how kernel tracing, pathname-based access control, and security enforcement assumptions can drift from each other under specific conditions.

I’d love to hear thoughts from people working on Linux security, eBPF, AppArmor, LSM internals, or runtime detection.

Security assumptions killing all the ecosystem.

github.com
u/secsecseec — 5 days ago

LID / Linux Is Dying

Hello again, I’m azqzazq1, a cybersecurity researcher.

My previous research, SunnyDayBPF, was recently featured by Ollie Whitehouse, CTO at the UK NCSC, in the Cyber Defence Analysis weekly summary.

Now I’m working on a new low-level Linux security research idea and I’d really like to hear opinions from people interested in eBPF, LSMs, AppArmor, and Linux hardening.

While spending more time with BPF internals, I noticed an interesting trust-boundary problem.

At a high level, the LSM framework prevents one LSM from simply overriding another LSM’s deny decision. However, eBPF tracing mechanisms can operate outside that LSM decision flow. This creates an interesting gap when combined with pathname-based MAC enforcement.

The research explores whether pre-LSM pathname manipulation through eBPF can cause AppArmor to evaluate a different path than the one originally requested by the user process.

In other words:

Can the security decision remain technically “valid” while the observed enforcement target is shifted before the LSM check?

I’m currently calling this research:

LID — Linux Integrity Drift

The focus is not “turning off AppArmor”, but understanding how kernel tracing, pathname-based access control, and security enforcement assumptions can drift from each other under specific conditions.

I’d love to hear thoughts from people working on Linux security, eBPF, AppArmor, LSM internals, or runtime detection.

Security assumptions killing all the ecosystem.

reddit.com
u/secsecseec — 5 days ago

LID / Linux Is Dying

Hello again, I’m azqzazq1, a cybersecurity researcher.

My previous research, SunnyDayBPF, was recently featured by Ollie Whitehouse, CTO at the UK NCSC, in the Cyber Defence Analysis weekly summary.

Now I’m working on a new low-level Linux security research idea and I’d really like to hear opinions from people interested in eBPF, LSMs, AppArmor, and Linux hardening.

While spending more time with BPF internals, I noticed an interesting trust-boundary problem.

At a high level, the LSM framework prevents one LSM from simply overriding another LSM’s deny decision. However, eBPF tracing mechanisms can operate outside that LSM decision flow. This creates an interesting gap when combined with pathname-based MAC enforcement.

The research explores whether pre-LSM pathname manipulation through eBPF can cause AppArmor to evaluate a different path than the one originally requested by the user process.

In other words:

Can the security decision remain technically “valid” while the observed enforcement target is shifted before the LSM check?

I’m currently calling this research:

LID — Linux Integrity Drift

The focus is not “turning off AppArmor”, but understanding how kernel tracing, pathname-based access control, and security enforcement assumptions can drift from each other under specific conditions.

I’d love to hear thoughts from people working on Linux security, eBPF, AppArmor, LSM internals, or runtime detection.

Security assumptions killing all the ecosystem.

reddit.com
u/secsecseec — 5 days ago
▲ 14 r/eBPF

LID / Linux Is Dying

Hello again, I’m azqzazq1, a cybersecurity researcher.

My previous research, SunnyDayBPF, was recently featured by Ollie Whitehouse, CTO at the UK NCSC, in the Cyber Defence Analysis weekly summary.

Now I’m working on a new low-level Linux security research idea and I’d really like to hear opinions from people interested in eBPF, LSMs, AppArmor, and Linux hardening.

While spending more time with BPF internals, I noticed an interesting trust-boundary problem.

At a high level, the LSM framework prevents one LSM from simply overriding another LSM’s deny decision. However, eBPF tracing mechanisms can operate outside that LSM decision flow. This creates an interesting gap when combined with pathname-based MAC enforcement.

The research explores whether pre-LSM pathname manipulation through eBPF can cause AppArmor to evaluate a different path than the one originally requested by the user process.

In other words:

Can the security decision remain technically “valid” while the observed enforcement target is shifted before the LSM check?

I’m currently calling this research:

LID — Linux Integrity Drift

The focus is not “turning off AppArmor”, but understanding how kernel tracing, pathname-based access control, and security enforcement assumptions can drift from each other under specific conditions.

I’d love to hear thoughts from people working on Linux security, eBPF, AppArmor, LSM internals, or runtime detection.

Security assumptions killing all the ecosystem.

reddit.com
u/secsecseec — 5 days ago

LID / Linux Is Dying

Hello again, I’m azqzazq1, a cybersecurity researcher.

My previous research, SunnyDayBPF, was recently featured by Ollie Whitehouse, CTO at the UK NCSC, in the Cyber Defence Analysis weekly summary.

Now I’m working on a new low-level Linux security research idea and I’d really like to hear opinions from people interested in eBPF, LSMs, AppArmor, and Linux hardening.

While spending more time with BPF internals, I noticed an interesting trust-boundary problem.

At a high level, the LSM framework prevents one LSM from simply overriding another LSM’s deny decision. However, eBPF tracing mechanisms can operate outside that LSM decision flow. This creates an interesting gap when combined with pathname-based MAC enforcement.

The research explores whether pre-LSM pathname manipulation through eBPF can cause AppArmor to evaluate a different path than the one originally requested by the user process.

In other words:

Can the security decision remain technically “valid” while the observed enforcement target is shifted before the LSM check?

I’m currently calling this research:

LID — Linux Integrity Drift

The focus is not “turning off AppArmor”, but understanding how kernel tracing, pathname-based access control, and security enforcement assumptions can drift from each other under specific conditions.

I’d love to hear thoughts from people working on Linux security, eBPF, AppArmor, LSM internals, or runtime detection.

Security assumptions killing all the ecosystem.

reddit.com
u/secsecseec — 5 days ago

LID / Linux Is Dying

Hello again, I’m azqzazq1, a cybersecurity researcher.

My previous research, SunnyDayBPF, was recently featured by Ollie Whitehouse, CTO at the UK NCSC, in the Cyber Defence Analysis weekly summary.

Now I’m working on a new low-level Linux security research idea and I’d really like to hear opinions from people interested in eBPF, LSMs, AppArmor, and Linux hardening.

While spending more time with BPF internals, I noticed an interesting trust-boundary problem.

At a high level, the LSM framework prevents one LSM from simply overriding another LSM’s deny decision. However, eBPF tracing mechanisms can operate outside that LSM decision flow. This creates an interesting gap when combined with pathname-based MAC enforcement.

The research explores whether pre-LSM pathname manipulation through eBPF can cause AppArmor to evaluate a different path than the one originally requested by the user process.

In other words:

Can the security decision remain technically “valid” while the observed enforcement target is shifted before the LSM check?

I’m currently calling this research:

LID — Linux Integrity Drift

The focus is not “turning off AppArmor”, but understanding how kernel tracing, pathname-based access control, and security enforcement assumptions can drift from each other under specific conditions.

I’d love to hear thoughts from people working on Linux security, eBPF, AppArmor, LSM internals, or runtime detection.

Security assumptions killing all the ecosystem.

What do you think about that researching?

reddit.com
u/secsecseec — 5 days ago

Im in weekly newsletter

SunnyDayBPF, an eBPF-based telemetry deception research project exploring post-syscall user-buffer trust assumptions, was recently featured in the CTO at NCSC Cyber Defence Analysis weekly summary by Ollie Whitehouse.

The project investigates whether user-space security tooling can observe altered telemetry after syscall completion but before downstream analysis/parsing stages.

Really appreciated seeing the work discussed alongside other low-level offensive and defensive security research.

Newsletter:

https://ctoatncsc.substack.com/p/cto-at-ncsc-summary-week-ending-may-106

u/secsecseec — 5 days ago

7.8 CVE I can take it. But I can’t do bug bounty

Hello dear researchers,
How are you all?

I have a question for you. I managed to get a kernel CVE. I genuinely feel confident and comfortable in this area, and surprisingly, it was not extremely difficult for me.

However, I still haven’t received my first bug bounty reward. The moment I get my first bounty, I’m planning to focus on this field full time.

What would your advice be on this? Especially for someone working as a Red Team specialist?

By the way, I’m currently working full time at a company where I perform web application pentesting, and I’m successful in that role. But when it comes to bug bounty, I feel unsuccessful.

My biggest problem is the overwhelming attack surface. Hundreds of subdomains and thousands of JavaScript files make me feel lost and mentally exhausted. Maybe it’s more of a mental challenge than a technical one.

What would your recommendations be?

u/secsecseec — 7 days ago
▲ 9 r/netsecstudents+2 crossposts

SunnyDayBPF: eBPF telemetry integrity research for detection engineering

I published SunnyDayBPF, an eBPF-based research project focused on post-syscall user-buffer telemetry deception.

The research is about telemetry integrity and detection engineering.

Core question:

Can a user-space security or logging agent successfully read telemetry, but still observe a modified version of that data before parsing and forwarding it to a SIEM, EDR, audit backend, or detection pipeline?

SunnyDayBPF focuses on the trust boundary between read-like syscall completion and user-space telemetry parsing.

Repository:

https://github.com/azqzazq1/SunnyDayBPF

SunnyDayBPF was originally proposed, named, and publicly documented by Azizcan Daştan. To the best of my knowledge, it is the first public research framing of post-syscall user-buffer telemetry deception with eBPF under this technique name.

This is published as authorized lab research and defensive telemetry integrity analysis, not as a production bypass framework.

I’d especially appreciate feedback from defenders on:

  • eBPF monitoring ideas
  • telemetry integrity validation
  • cross-source correlation
  • detection engineering approaches
  • limitations and prior art
u/secsecseec — 13 days ago
▲ 2 r/eBPF

Question: post-syscall telemetry integrity with eBPF

I’m researching a telemetry integrity question around eBPF and Linux monitoring agents.

The idea is focused on the trust boundary between read-like syscall completion and user-space agent parsing.

A simplified version of the question:

If a user-space security/logging agent successfully reads telemetry into its buffer, can that observation path still diverge from ground truth before the agent parses and forwards the data?

I’m looking for feedback from people working with eBPF on:

  • whether this framing makes sense
  • possible prior art
  • defensive monitoring ideas
  • BPF hardening approaches
  • limitations around verifier/kernel behavior
  • ways defenders can validate telemetry integrity across multiple sources

I have a public research repo and DOI, but I’m avoiding dropping links here in case that triggers filters. Happy to share in comments if allowed.Question: post-syscall telemetry integrity with eBPF

reddit.com
u/secsecseec — 13 days ago