CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
723 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
🖥 🔣 https://system32.ink/zimbra-smtp-remote-command-execution-cve-2024-45519-exploit/

📥 Zimbra SMTP - Remote Command Execution CVE-2024-45519 Exploit 🖥


ℹ️ Zimbra, a widely used email and collaboration platform, recently released a critical security update addressing a severe vulnerability in its postjournal service. This vulnerability, identified as CVE-2024-45519, allows unauthenticated attackers to execute arbitrary commands on affected Zimbra installations. In this blog post, we delve into the nature of this vulnerability, our journey in analyzing the patch, and the steps we took to exploit it manually. We also discuss the potential impact and emphasize the importance of timely patch application.➡️

Please open Telegram to view this post
VIEW IN TELEGRAM
👍2🔥2
Cyber espionage group Outrider Tiger (suspected to be an Indian state-sponsored group) targeted Pakistan's Nuclear powerplant with a sophisticated cyber attack.
Bangladeshi government and military organizations, and some Chinese CCP entities also targeted: Report


Fishing Elephant is a threat actor that primarily targets victims in Bangladesh and Pakistan. They rely on consistent TTPs, including payload and communication patterns, while occasionally incorporating new techniques such as geo-fencing and hiding executables within certificate files. Their tool of choice is AresRAT, which they deliver through platforms like Heroku and Dropbox. Recently, they have shifted their focus to government and diplomatic entities in Turkey, Pakistan, Bangladesh, Ukraine, and China.
🔥932👍2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #16 is out now.

Highlights: Create portfolio as OSINT Researcher, new community launch, new podcast series and a lot of new tools...

https://osintupdates.com/p/wednesday-updates-16

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
👍42🍾1
या देवी सर्वभूतेषु विष्णुमायेति शब्दिता।
नमस्तस्यै नमस्तस्यै नमस्तस्यै नमो नमः॥


As per the Kalpas (Puranas), there are three dimensions of Shakti (the feminine energy): Mahakali (strength or power), Mahalakshmi (wealth, passion and material well-being), and Mahasaraswati (knowledge, dissolution, transcendence of the limitations of the mortal body). They are believed to represent the cosmos as the Earth, the Sun and the Moon.

नवरात्रि की हार्दिक शुभकामनाएं।
29🙏7👍3
🖥 ➡️ https://system32.ink/nortek-linear-emerge-e3-pre-auth-rce-cve-2024-9441-exploit/

🖥 Nortek Linear eMerge E3 Pre-Auth RCE CVE-2024-9441 Exploit 💡


ℹ️ Nortek Linear eMerge E3 (CVE-2024-9441), which is vulnerable to Remote Code Execution (RCE) in a pre-authentication state. The vulnerability is triggered via a flaw in the password recovery feature, which allows an attacker to inject malicious PHP code into the system, leading to arbitrary code execution. 💻
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
Bangladesh Navy Site Breached – Final Warning

The Night Hunters have successfully breached the Bangladesh Navy's web server, exposing serious vulnerabilities in their DBMS and database. Out of consideration, we are not leaking the database, but instead uploading a proof of concept to demonstrate the weaknesses in their security.

This is a final warning. The ongoing interference by Bangladeshi hackers and their government in Indian matters must stop immediately. Any further provocations will result in severe consequences—we will not show restraint again.
❤‍🔥136🔥42👍2🍾1
🖥🔣https://system32.ink/zimbra-remote-command-execution-cve-2024-45519-exploit/

🖥 Zimbra - Remote Command Execution CVE-2024-45519 Exploit 🖥


📡 CVE-2024-45519 is a vulnerability in Zimbra Collaboration (ZCS) that allows unauthenticated users to execute commands through the postjournal service. This guide walks you through setting up a lab environment to reproduce the issue and execute the exploit.➡️💻

😐 🔠🔠🔠🔠0️⃣🔠🔠
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in the widget
VIEW IN TELEGRAM
9👍2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #17 is out now.

Highlights: New AI features in OSINT products, Simplify GEOint, Beginner's guide to Missing Persons, new CTF, What's the future of OSINT and many more...

https://osintupdates.com/p/wednesday-updates-17

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
You will always be remembered sir om shanti 🙏
💔26🙏5
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
My friend started a YouTube channel for teaching ethical hacking in hindi but this channel is different from others his main aim is to cover basic concepts before ethical hacking which is very essential to become a skilled hacker.

https://youtu.be/KuIgBEDuFmA?si=-wcOgGtl394m6H5i
6
धर्मो जयति नाधर्मः सत्यं जयति नानृतम् |

धर्म जीतता है, अधर्म नहीं। सत्य जीतता है, असत्य नहीं।

Dharma wins, not Adharma. Truth wins, not lies.

शुभ दशहरा 🙏
🙏233👍2🎉2
Please open Telegram to view this post
VIEW IN TELEGRAM
8😎4👍2💔2🫡2🗿1
🖥➡️ https://system32.ink/grafana-post-auth-duckdb-sql-injection-file-read-cve-2024-9264-exploit/

💻 Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264 Exploit 🖥


ℹ️ The SQL Expressions experimental feature of Grafana allows for the evaluation of duckdb queries containing user input. These queries are insufficiently sanitized before being passed to duckdb, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The duckdb binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions. 😐
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
International Incoming Spoofed Calls Prevention System" - launched by Govt of India to prevent frauds and other activities.

This system has already blocked 1.3 crore calls in a day.
🔥1332❤‍🔥1👍1
71