TERKINI* ISU INI TELAH DISELESAIKAN. Sistem adalah selamat sekarang.
- Kelemahan dalam pengendalian authentication ini tidak ditemui semasa Security Posture Assessment (SPA).
- Pasukan telah mengambil tindakan segera serta penyelesaian telah dilaksanakan dalam tempoh 1 jam dan telah selesai pada 2 Januari 2024 jam 9.15 malam.
***
Macam tu lah dia punya security. Adoila.
Tak tegur nanti orang kata walanon.
Tegur nanti orang kata walaun.
Kelemahan pada API (Application Programming Interface) sistem PADU membolehkan pihak tidak bertanggungjawab mengubah maklumat login (password) kita dengan hanya menggunakan maklumat nombor kad pengenalan.
Mana nak dapat nombor kad pengenalan? Banyak dah bocor. Tak perlu cari dekat dark web, Internet forum biasa pun berlambak dah.
Rafizi Ramli
Fahmi Fadzil
Dr. Ong Kian Ming - ηε»Ίζ°
https://m.facebook.com/story.php?story_fbid=pfbid0DXrra3e1r7cckhkdVVQYAxVoo2eddF5uLWD9gcaWtQUVCuhmwydsZizaHjZ8oSxHl&id=100063807923072&mibextid=NOb6eG
- Kelemahan dalam pengendalian authentication ini tidak ditemui semasa Security Posture Assessment (SPA).
- Pasukan telah mengambil tindakan segera serta penyelesaian telah dilaksanakan dalam tempoh 1 jam dan telah selesai pada 2 Januari 2024 jam 9.15 malam.
***
Macam tu lah dia punya security. Adoila.
Tak tegur nanti orang kata walanon.
Tegur nanti orang kata walaun.
Kelemahan pada API (Application Programming Interface) sistem PADU membolehkan pihak tidak bertanggungjawab mengubah maklumat login (password) kita dengan hanya menggunakan maklumat nombor kad pengenalan.
Mana nak dapat nombor kad pengenalan? Banyak dah bocor. Tak perlu cari dekat dark web, Internet forum biasa pun berlambak dah.
Rafizi Ramli
Fahmi Fadzil
Dr. Ong Kian Ming - ηε»Ίζ°
https://m.facebook.com/story.php?story_fbid=pfbid0DXrra3e1r7cckhkdVVQYAxVoo2eddF5uLWD9gcaWtQUVCuhmwydsZizaHjZ8oSxHl&id=100063807923072&mibextid=NOb6eG
π2
Forwarded from πΆπππ πΊπ πΏππ π―πππππππ
Ψ³ΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩ
Ω Ψ§ΩΩΩΩ Ψ§ΩΨ±ΩΩΨΩΩ
ΩΩΩ Ψ§ΩΨ±ΩΩΨΩΩΩΩ
Ω
Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ± Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ± Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ±
Ψ₯Ω Ψ΄Ψ§Ψ‘ Ψ§ΩΩΩ
We are legionβwe do not forgiveβwe do not forgetβexpect usβ
We are not PHISANGGGGGβοΈ
We are not PALABANAβοΈ
We are not PALATAUβοΈ
ππ€£ππ€£ππ€£ππ€£
MASA DDOS : 1οΈβ£1οΈβ£ : 0οΈβ£0οΈβ£ pm
TARIKH : 09.DISEMBER.2023
Target : https://www.natal.org.il
No WAF detected by the generic detection
IP : 185.106.128.156
Hostname : 185.106.128.156
ISP : O.M.C. COMPUTERS & COMMUNICATIONS LTD
Port : 53 open domain
Port : open 80 http
Port : open 443 https
Port : 8443 http-alt
Method : GET HEAD POST
Method Proxy : http-proxy/socks5.txt
Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ± Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ± Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ±
Ψ₯Ω Ψ΄Ψ§Ψ‘ Ψ§ΩΩΩ
We are legionβwe do not forgiveβwe do not forgetβexpect usβ
We are not PHISANGGGGGβοΈ
We are not PALABANAβοΈ
We are not PALATAUβοΈ
ππ€£ππ€£ππ€£ππ€£
MASA DDOS : 1οΈβ£1οΈβ£ : 0οΈβ£0οΈβ£ pm
TARIKH : 09.DISEMBER.2023
Target : https://www.natal.org.il
No WAF detected by the generic detection
IP : 185.106.128.156
Hostname : 185.106.128.156
ISP : O.M.C. COMPUTERS & COMMUNICATIONS LTD
Port : 53 open domain
Port : open 80 http
Port : open 443 https
Port : 8443 http-alt
Method : GET HEAD POST
Method Proxy : http-proxy/socks5.txt
π₯1
Exploit for Out-of-bounds Write in Polkit Project Polkit exploit
https://sploitus.com/exploit?id=7F53E177-1517-5E69-84F1-CC304A3F87F3
Intrasrv Simple Web Server 1.0 Denial Of Service Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39231
liveSite 2019.1 Remote Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39234
AdvantechWeb / SCADA 9.1.5U SQL Injection Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39233
Microsoft SQL Server db_ddladmin Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39232
cpio 2.13 Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39235
Exploit for Missing Authentication for Critical Function in F5 Big-Ip Access Policy Manager exploit
https://sploitus.com/exploit?id=A6CCA51E-2A51-52B2-A2E6-4518F7790F37
https://sploitus.com/exploit?id=7F53E177-1517-5E69-84F1-CC304A3F87F3
Intrasrv Simple Web Server 1.0 Denial Of Service Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39231
liveSite 2019.1 Remote Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39234
AdvantechWeb / SCADA 9.1.5U SQL Injection Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39233
Microsoft SQL Server db_ddladmin Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39232
cpio 2.13 Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39235
Exploit for Missing Authentication for Critical Function in F5 Big-Ip Access Policy Manager exploit
https://sploitus.com/exploit?id=A6CCA51E-2A51-52B2-A2E6-4518F7790F37
Sploitus
π Exploit for Out-of-bounds Read in Polkit Project Polkit CVE-2021-4034
Exploit for Out-of-bounds Read in Polkit Project Polkit CVE-2021-4034 | Sploitus | Exploit & Hacktool Search Engine
π₯2
ADA KA OQANG SIK KEDAH KA DALAM NI? πBEST NI ADA WAYANG KULIT/CERAMAH DAN SEBAGAINYAππ₯°, JEMPUT HADIR NANTI, HARAP SAYA PUN XKENA SCAM JUGAK LA NANTIπ€£π₯°
SALAMFORCE24 By @HelangMerahGroup π¦
SITE: https://rankonetechnology.in/hmg.html
Zone-H <OK
Greetz:
#StucxTeam
#4-EXPLOITATION
#SkyNetdox
#AnonymosIslamic
#JokersSec
#HelangMerahGroup
#GhostClanMalaysiaπ²πΎ
SITE: https://rankonetechnology.in/hmg.html
Zone-H <OK
Greetz:
#StucxTeam
#4-EXPLOITATION
#SkyNetdox
#AnonymosIslamic
#JokersSec
#HelangMerahGroup
#GhostClanMalaysiaπ²πΎ
rankonetechnology.in
HELANG MERAH GROUP
π₯2
Forwarded from Cinta Salam Malaysia
Salam Subuh semua!
Jom kita #SedekahSubuhMacamJumaat
Cara-caranya mudah je!
1. Klik www.ramadan4syria.com
2. β Pilih slot βAmaun lain-lainβ
3. β Tuliskan amaun sumbangan anda.
3. β Klik βSumbang Sekarang.'
Terima kasih!
Jom kita #SedekahSubuhMacamJumaat
Cara-caranya mudah je!
1. Klik www.ramadan4syria.com
2. β Pilih slot βAmaun lain-lainβ
3. β Tuliskan amaun sumbangan anda.
3. β Klik βSumbang Sekarang.'
Terima kasih!
Assalamualaikum Dan SALAMFORCE24 @HelangMerahGroup π¦
Target untuk hangpa nah
https://www.instagram.com/reel/C0-fuPoJV-7/?igsh=aWxrejhxYTQxaXA3
CC - @TrashDono
Target untuk hangpa nah
https://www.instagram.com/reel/C0-fuPoJV-7/?igsh=aWxrejhxYTQxaXA3
CC - @TrashDono
Forwarded from α΄α΄Ι΄Ι’α΄α΄Κα΄α΄α΄ΚΚα΄Κα΄Κα΄α΄‘ Official
π¨βπ» Microsoft's latest January 2024 Patch Tuesday updates address 48 security flaws. Two of these flaws are rated Critical, while the rest are marked as Important.
Learn more: https://thehackernews.com/2024/01/microsofts-january-2024-windows-update.html
Learn more: https://thehackernews.com/2024/01/microsofts-january-2024-windows-update.html
Forwarded from α΄α΄Ι΄Ι’α΄α΄Κα΄α΄α΄ΚΚα΄Κα΄Κα΄α΄‘ Official
π Good news for ransomware victims!
Researchers have released FREE DECRYPTORs for both the Tortilla variant of Babuk ransomware and Black Basta ransomware.
Regain control of your files now β‘οΈ https://thehackernews.com/2024/01/free-decryptor-released-for-black-basta.html
Researchers have released FREE DECRYPTORs for both the Tortilla variant of Babuk ransomware and Black Basta ransomware.
Regain control of your files now β‘οΈ https://thehackernews.com/2024/01/free-decryptor-released-for-black-basta.html
Forwarded from πΆπππ πΊπ πΏππ π―πππππππ
Ψ³ΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩ
Ω Ψ§ΩΩΩΩ Ψ§ΩΨ±ΩΩΨΩΩ
ΩΩΩ Ψ§ΩΨ±ΩΩΨΩΩΩΩ
Ω
Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ± Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ± Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ±
Ψ₯Ω Ψ΄Ψ§Ψ‘ Ψ§ΩΩΩ
We are legionβwe do not forgiveβwe do not forgetβexpect usβ
Kita sudah tua tapi kita tidak lupa βPHISANGGGGGβοΈ
ππ€£ππ€£ππ€£π€£ππ€£ππ€£ππ€£ππ€£ππ€£ππ€£ππ€£ππ€£
MASA DDOS : 0οΈβ£9οΈβ£ : 0οΈβ£0οΈβ£ pm
TARIKH : 10.DISEMBER.2023
Target : https://studyisrael.org.il
IP : 88.218.117.88
Hostname : s-vps-il-681.upress.io
ISP : uPress Inc
Info : no waf
Port : 53
Port : 80
Port : 443
Method : GET HEAD POST
Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ± Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ± Ψ§ΩΩΩ Ψ£ΩΨ¨Ψ±
Ψ₯Ω Ψ΄Ψ§Ψ‘ Ψ§ΩΩΩ
We are legionβwe do not forgiveβwe do not forgetβexpect usβ
Kita sudah tua tapi kita tidak lupa βPHISANGGGGGβοΈ
ππ€£ππ€£ππ€£π€£ππ€£ππ€£ππ€£ππ€£ππ€£ππ€£ππ€£ππ€£
MASA DDOS : 0οΈβ£9οΈβ£ : 0οΈβ£0οΈβ£ pm
TARIKH : 10.DISEMBER.2023
Target : https://studyisrael.org.il
IP : 88.218.117.88
Hostname : s-vps-il-681.upress.io
ISP : uPress Inc
Info : no waf
Port : 53
Port : 80
Port : 443
Method : GET HEAD POST
π₯2
Forwarded from DragonForce Malaysia
Assalamualaikum w.b.t semua
Insya Allah pada malam 11/1/2024, akan diadakan majlis bacaan Yasin oleh pihak i-Radio DFM. Sesiapa berkelapangan boleh turut serta bagi mengimarahkan majlis ini.
Link : https://t.me/iRadioDFM
Live Bacaan Yaasin TikTok: https://www.tiktok.com/@dragonforceio
Insya Allah pada malam 11/1/2024, akan diadakan majlis bacaan Yasin oleh pihak i-Radio DFM. Sesiapa berkelapangan boleh turut serta bagi mengimarahkan majlis ini.
Link : https://t.me/iRadioDFM
Live Bacaan Yaasin TikTok: https://www.tiktok.com/@dragonforceio
π2π₯1