Forwarded from cybermetics
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM
This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.
ID:CVE-2022-20083
Title: Out-of-bounds write in Modem 2G/3G CC
Description: In Modem 2G/3G CC, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-21744
Title: Out-of-bounds write in Modem 2G RR
Description: In Modem 2G RR, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighboring cell size with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-33936
Title: Remote code execution vulnerability in Dell EMC Storage
Description: Cloud Mobility for Dell EMC Storage, 1.3.0.XXX contains an RCE vulnerability. A non-privileged user could potentially exploit this vulnerability, leading to achieving a root shell. This is a critical issue; so, Dell recommends customers upgrade at the earliest opportunity.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-32449
Title: Command injection vulnerability in TOTOLINK EX300_V2 V4.0.3c.7484
Description: TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-31137
Title: Remote code execution vulnerability in Roxy-WI
Description: Roxy-WI is a web interface for managing Haproxy, Nginx, Apache, and Keepalived servers.
Roxy-WI versions older than 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-25046
Title: Path traversal vulnerability in CWP v0.9.8.1122
Description: A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM
This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.
ID:
Title: Out-of-bounds write in Modem 2G/3G CC
Description: In Modem 2G/3G CC, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Out-of-bounds write in Modem 2G RR
Description: In Modem 2G RR, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighboring cell size with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Remote code execution vulnerability in Dell EMC Storage
Description: Cloud Mobility for Dell EMC Storage, 1.3.0.XXX contains an RCE vulnerability. A non-privileged user could potentially exploit this vulnerability, leading to achieving a root shell. This is a critical issue; so, Dell recommends customers upgrade at the earliest opportunity.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Command injection vulnerability in TOTOLINK EX300_V2 V4.0.3c.7484
Description: TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Remote code execution vulnerability in Roxy-WI
Description: Roxy-WI is a web interface for managing Haproxy, Nginx, Apache, and Keepalived servers.
Roxy-WI versions older than 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Path traversal vulnerability in CWP v0.9.8.1122
Description: A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
mail.acronis.com is vulnerable to zero day vulnerability CVE-2022-41040
https://hackerone.com/reports/1719719
https://hackerone.com/reports/1719719
HackerOne
Acronis disclosed on HackerOne: mail.acronis.com is vulnerable to...
mail.acronis.com was vulnerable to CVE-2022-41040.
After internal investigation, Acronis security team concluded that there are no signs of exploitation of this issue.
After internal investigation, Acronis security team concluded that there are no signs of exploitation of this issue.
THM RT.zip
100.9 MB
#Leaked โก๏ธ
Learn the skills needed to become a Red Team Operator
Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory
Level: Intermediate | 48 hours
@redteamcollection
Red Teaming tryhackme ๐งโ๐ปLearn the skills needed to become a Red Team Operator
Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory
Level: Intermediate | 48 hours
@redteamcollection
โโโโ1 Red Team Fundamentals
โ โโโโTryHackMe _ Intro to C2_files
โ โโโโTryHackMe _ Red Team Engagements_files
โ โโโโTryHackMe _ Red Team Fundamentals_files
โ โโโโTryHackMe _ Red Team OPSEC_files
โ โโโโTryHackMe _ Red Team Threat Intel_files
โโโโ2 Initial Access
โ โโโโTryHackMe _ Password Attacks_files
โ โโโโTryHackMe _ Phishing_files
โ โโโโTryHackMe _ Red Team Recon_files
โ โโโโTryHackMe _ Weaponization_files
โโโโ3 Post Compromise
โ โโโโTryHackMe _ Data Exfiltration_files
โ โโโโTryHackMe _ Enumeration_files
โ โโโโTryHackMe _ Lateral Movement and Pivoting_files
โ โโโโTryHackMe _ The Lay of the land_files
โ โโโโTryHackMe _ Windows Local Persistence_files
โ โโโโTryHackMe _ Windows Privilege Escalation_files
โโโโ4 Host Evasions
โ โโโโTryHackMe _ Abusing Windows Internals_files
โ โโโโTryHackMe _ AV Evasion_ Shellcode_files
โ โโโโTryHackMe _ Bypassing UAC_files
โ โโโโTryHackMe _ Evading Logging and Monitoring_files
โ โโโโTryHackMe _ Introduction to Antivirus_files
โ โโโโTryHackMe _ Introduction to Windows API_files
โ โโโโTryHackMe _ Living Off the Land_files
โ โโโโTryHackMe _ Obfuscation Principles_files
โ โโโโTryHackMe _ Runtime Detection Evasion_files
โ โโโโTryHackMe _ Signature Evasion_files
โ โโโโTryHackMe _ Windows Internals_files
โโโโ5 Network Scurity Evasion
โ โโโโTryHackMe _ Firewalls_files
โ โโโโTryHackMe _ Network Security Solutions_files
โ โโโโTryHackMe _ Sandbox Evasion_files
โโโโ6 Compromising AD
โโโโTryHackMe _ Active Directory Basics_files
โโโโTryHackMe _ Breaching Active Directory_files
โโโโTryHackMe _ Credentials Harvesting_files
โโโโTryHackMe _ Enumerating Active Directory_files
โโโโTryHackMe _ Exploiting Active Directory_files
โโโโTryHackMe _ Lateral Movement and Pivoting_files
โโโโTryHackMe _ Persisting Active Directory_files
โ โโโโTryHackMe _ Intro to C2_files
โ โโโโTryHackMe _ Red Team Engagements_files
โ โโโโTryHackMe _ Red Team Fundamentals_files
โ โโโโTryHackMe _ Red Team OPSEC_files
โ โโโโTryHackMe _ Red Team Threat Intel_files
โโโโ2 Initial Access
โ โโโโTryHackMe _ Password Attacks_files
โ โโโโTryHackMe _ Phishing_files
โ โโโโTryHackMe _ Red Team Recon_files
โ โโโโTryHackMe _ Weaponization_files
โโโโ3 Post Compromise
โ โโโโTryHackMe _ Data Exfiltration_files
โ โโโโTryHackMe _ Enumeration_files
โ โโโโTryHackMe _ Lateral Movement and Pivoting_files
โ โโโโTryHackMe _ The Lay of the land_files
โ โโโโTryHackMe _ Windows Local Persistence_files
โ โโโโTryHackMe _ Windows Privilege Escalation_files
โโโโ4 Host Evasions
โ โโโโTryHackMe _ Abusing Windows Internals_files
โ โโโโTryHackMe _ AV Evasion_ Shellcode_files
โ โโโโTryHackMe _ Bypassing UAC_files
โ โโโโTryHackMe _ Evading Logging and Monitoring_files
โ โโโโTryHackMe _ Introduction to Antivirus_files
โ โโโโTryHackMe _ Introduction to Windows API_files
โ โโโโTryHackMe _ Living Off the Land_files
โ โโโโTryHackMe _ Obfuscation Principles_files
โ โโโโTryHackMe _ Runtime Detection Evasion_files
โ โโโโTryHackMe _ Signature Evasion_files
โ โโโโTryHackMe _ Windows Internals_files
โโโโ5 Network Scurity Evasion
โ โโโโTryHackMe _ Firewalls_files
โ โโโโTryHackMe _ Network Security Solutions_files
โ โโโโTryHackMe _ Sandbox Evasion_files
โโโโ6 Compromising AD
โโโโTryHackMe _ Active Directory Basics_files
โโโโTryHackMe _ Breaching Active Directory_files
โโโโTryHackMe _ Credentials Harvesting_files
โโโโTryHackMe _ Enumerating Active Directory_files
โโโโTryHackMe _ Exploiting Active Directory_files
โโโโTryHackMe _ Lateral Movement and Pivoting_files
โโโโTryHackMe _ Persisting Active Directory_files
XRY Reader to XAMN Viewer transition course
Module 1:
https://bit.ly/2tgjipU
Module 2:
https://bit.ly/2DBrHJc
Module 3:
https://bit.ly/2RSAmfH
Module 4:
https://bit.ly/2N0uZu0
password for the course is โ
Module 1:
https://bit.ly/2tgjipU
Module 2:
https://bit.ly/2DBrHJc
Module 3:
https://bit.ly/2RSAmfH
Module 4:
https://bit.ly/2N0uZu0
password for the course is โ
xamnviewerโCELLEBRITE AND MSAB
Cellebrite magnet link:
Cellebrite magnet link:
magnet:?xt=urn:btih:f881291ab69fff48393ede2e36a4f8fcb4b5bf7a&dn=cellebrite&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce
MSAB download link:magnet:?xt=urn:btih:0e7d11a34f71887aca3a388795e0b019cca44858&dn=msab.tar.zst&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounceโจ
๐งต๐ง๐ง๐ง๐ง๐ง
๐งตโฌ๏ธโฌ๏ธ๐ตโฌโฌ
๐งต๐ฉ๐ฉ๐ฉ๐ฉ๐ฉ
๐งต ๐ฟ
๐งต ๐บ
๐งต ๐ฑ ๐ธ
๐งต ๐
๐งต ๐ ๐
๐งต
๐งต ๐ ๐บ
๐งต
๐งต๐ ๐ ๐
๐งต ๐บ
๐งต ๐ธ
๐๐๐
๐๐๐๐
๐๐๐๐๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
HAPPY REPUBLIC DAY ๐ ๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
๐ฅ๐ ๐๐ฎ ๐๐๐ฃ๐ ๐ ๐๐ฎ ๐ฝ๐๐๐ง๐๐ฉ๐ฅ
๐ฎ๐ณ๐๐๐๐๐ 74๐ญ๐ก ๐๐๐๐๐๐๐๐ ๐๐๐
๐งต๐ง๐ง๐ง๐ง๐ง
๐งตโฌ๏ธโฌ๏ธ๐ตโฌโฌ
๐งต๐ฉ๐ฉ๐ฉ๐ฉ๐ฉ
๐งต ๐ฟ
๐งต ๐บ
๐งต ๐ฑ ๐ธ
๐งต ๐
๐งต ๐ ๐
๐งต
๐งต ๐ ๐บ
๐งต
๐งต๐ ๐ ๐
๐งต ๐บ
๐งต ๐ธ
๐๐๐
๐๐๐๐
๐๐๐๐๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
HAPPY REPUBLIC DAY ๐ ๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
๐ฅ๐ ๐๐ฎ ๐๐๐ฃ๐ ๐ ๐๐ฎ ๐ฝ๐๐๐ง๐๐ฉ๐ฅ
๐ฎ๐ณ๐๐๐๐๐ 74๐ญ๐ก ๐๐๐๐๐๐๐๐ ๐๐๐
QRLJackerQRLJacker is a highly customizable exploitation framework to hijack services that depend on QR Code as an authentication and login method
OWASP's links reference
https://www.owasp.org/index.php/QRLJacking
https://www.owasp.org/index.php/OWASP_QRLJacker
If you want to write your own module
Read here
โ๏ธ Github repositories every Developer should know โ๏ธ
โ๏ธA very popular repo that curates all topics from Development, testing, business, etc, etc.
https://github.com/sindresorhus/awesome
โ๏ธClean Code JavaScript
https://github.com/ryanmcdermott/clean-code-javascript
โ๏ธTech Interview Handbook
https://github.com/yangshun/tech-interview-handbook
โ๏ธDeveloper Roadmaps, articles and resources for developers.
https://github.com/kamranahmedse/developer-roadmap
โ๏ธ33 JS Concepts
https://github.com/leonardomso/33-js-concepts
โ๏ธBest websites a programmer should visit
https://github.com/sdmg15/Best-websites-a-programmer-should-visit
โ๏ธDesign Resources for Developers
https://github.com/bradtraversy/design-resources-for-developers
โ๏ธBig List of Naughty Strings:
https://github.com/minimaxir/big-list-of-naughty-strings
โ๏ธA very popular repo that curates all topics from Development, testing, business, etc, etc.
https://github.com/sindresorhus/awesome
โ๏ธClean Code JavaScript
https://github.com/ryanmcdermott/clean-code-javascript
โ๏ธTech Interview Handbook
https://github.com/yangshun/tech-interview-handbook
โ๏ธDeveloper Roadmaps, articles and resources for developers.
https://github.com/kamranahmedse/developer-roadmap
โ๏ธ33 JS Concepts
https://github.com/leonardomso/33-js-concepts
โ๏ธBest websites a programmer should visit
https://github.com/sdmg15/Best-websites-a-programmer-should-visit
โ๏ธDesign Resources for Developers
https://github.com/bradtraversy/design-resources-for-developers
โ๏ธBig List of Naughty Strings:
https://github.com/minimaxir/big-list-of-naughty-strings
GitHub
GitHub - sindresorhus/awesome: ๐ Awesome lists about all kinds of interesting topics
๐ Awesome lists about all kinds of interesting topics - sindresorhus/awesome
The repository includes links to various tools, frameworks, and resources that can be used by Red Teamers to conduct attacks, as well as resources for defenders to improve their security posture.
The repository is organized into several categories, including reconnaissance and information gathering, exploitation, post-exploitation, and defense evasion. Each category contains links to various tools and resources that can be used in Red Team Operations.
Some of the tools and frameworks included in the repository are well-known and widely used, such as Metasploit, Cobalt Strike, and Empire. Other tools and frameworks are less well-known but still valuable for Red Team Operations, such as BloodHound, which is used for Active Directory reconnaissance, and GoPhish, which is used for phishing simulations.
In addition to tools and frameworks, the repository also includes links to blogs, articles, and other resources that provide guidance on conducting Red Team Operations and improving overall security posture. These resources cover a wide range of topics, including social engineering, network infrastructure, and application security.
Overall, the "Awesome-Red-Team-Operations" repository is a valuable resource for Red Teamers, defenders, and anyone interested in learning more about cybersecurity.
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
The repository is organized into several categories, including reconnaissance and information gathering, exploitation, post-exploitation, and defense evasion. Each category contains links to various tools and resources that can be used in Red Team Operations.
Some of the tools and frameworks included in the repository are well-known and widely used, such as Metasploit, Cobalt Strike, and Empire. Other tools and frameworks are less well-known but still valuable for Red Team Operations, such as BloodHound, which is used for Active Directory reconnaissance, and GoPhish, which is used for phishing simulations.
In addition to tools and frameworks, the repository also includes links to blogs, articles, and other resources that provide guidance on conducting Red Team Operations and improving overall security posture. These resources cover a wide range of topics, including social engineering, network infrastructure, and application security.
Overall, the "Awesome-Red-Team-Operations" repository is a valuable resource for Red Teamers, defenders, and anyone interested in learning more about cybersecurity.
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
GitHub
GitHub - CyberSecurityUP/Awesome-Red-Team-Operations
Contribute to CyberSecurityUP/Awesome-Red-Team-Operations development by creating an account on GitHub.
Forwarded from RED TEAM COLLECTIONS
Artificial Intelligence (
As we move towards the future, the importance of AI is only going to increase. The growth of AI has been exponential, especially in the fields of development and cybersecurity. There are new tools, techniques, and innovations being introduced every day, and it's important to keep up with the latest trends.
That's why we're excited to announce that we're hosting a discussion on the
topic "AI the Future" today from 9๏ธโฃ PM to 1๏ธโฃ0๏ธโฃ PM IST. During the discussion, we will be exploring different aspects of AI and its impact on the world. We invite everyone to participate, share their ideas, and discuss the latest tools, topics, and innovations related to AI.We hope that this discussion will be an opportunity for all of us to learn and explore something new. It's a chance to expand our knowledge and to stay up to date with the latest trends in the world of AI.
Don't forget to subscribe to us on Instagram to stay updated with our latest events and discussions.
Follow us at https://www.instagram.com/googledevlop/
Powered By @GDB_HackerOne
Please open Telegram to view this post
VIEW IN TELEGRAM