📃 "¿Cómo verificar si su servidor Linux ha sido hackeado?" https://noticiasseguridad.com/tutoriales/como-verificar-si-su-servidor-linux-ha-sido-hackeado/
Noticias de seguridad informática, ciberseguridad y hacking
¿CÓMO VERIFICAR SI SU SERVIDOR LINUX HA SIDO HACKEADO?
¿CÓMO VERIFICAR SI SU SERVIDOR LINUX HA SIDO HACKEADO? : Tutorial de hacking ético, ciber seguridad, especialistas, servicios
Acuerdo con Ekoparty para distribruir libros de @0xWord en Argentina y los distribuidores en Ecuador, México, Colombia, Panamá, Chile y Costa Rica.
http://feedproxy.google.com/~r/ElLadoDelMal/~3/MY6T0y18kUk/acuerdo-con-ekoparty-para-distribruir.html
http://feedproxy.google.com/~r/ElLadoDelMal/~3/MY6T0y18kUk/acuerdo-con-ekoparty-para-distribruir.html
Elladodelmal
Acuerdo con Ekoparty para distribruir libros de @0xWord en Argentina y los distribuidores en Ecuador, México, Colombia, Panamá…
Blog personal de Chema Alonso, CDCO Telefónica, 0xWord, MyPublicInbox, sobre seguridad, hacking, hackers y Cálico Electrónico.
Zero-day en Python 3.8.0 a 3.8.3 causa colisión de hash que puede convertirse en un ataque DOS
https://unaaldia.hispasec.com/2020/07/zero-day-en-python-3-8-0-a-3-8-3-causa-colision-de-hash-que-puede-convertirse-en-un-ataque-dos.html
https://unaaldia.hispasec.com/2020/07/zero-day-en-python-3-8-0-a-3-8-3-causa-colision-de-hash-que-puede-convertirse-en-un-ataque-dos.html
Una al DÃa
Zero-day en Python 3.8.0 a 3.8.3 causa colisión de hash que puede convertirse en un ataque DOS
Asignada como CVE.2020-14422, la vulnerabilidad en Python que afecta a las versiones 3.8.0, 3.8.1, 3.8.2 y 3.8.3 puede causar una colisión de hashes en IPv4 e IPv6., que puede convertirse en una denegación de servicio (DOS) La vulnerabilidad se produce debido…
Citrix Releases Critical Software Patches for 11 New Security Vulnerabilities Affecting ADC, Gateway, and SD-WAN WANOP Appliances.
Read More: https://thehackernews.com/2020/07/citrix-software-security-update.html
Read More: https://thehackernews.com/2020/07/citrix-software-security-update.html
Research:
Citrix ADC/NetScaler Gateway Vulnerability Details (CVE-2020-8194) (PoC)
https://dmaasland.github.io/posts/citrix.html
Citrix ADC/NetScaler Gateway Vulnerability Details (CVE-2020-8194) (PoC)
https://dmaasland.github.io/posts/citrix.html
CVE-2020-5764:
Android MX Player <1.24.5
- receive shared data file from other device (wireless)
- data file will exploit path traversal vulnerability
- RCE of received file
https://medium.com/tenable-techblog/android-mx-player-path-traversal-to-code-execution-9134b623eb34
PoC:
https://github.com/tenable/poc/tree/master/MXPlayer
Android MX Player <1.24.5
- receive shared data file from other device (wireless)
- data file will exploit path traversal vulnerability
- RCE of received file
https://medium.com/tenable-techblog/android-mx-player-path-traversal-to-code-execution-9134b623eb34
PoC:
https://github.com/tenable/poc/tree/master/MXPlayer
Medium
Android MX Player — Path Traversal to Code Execution
MX Player is an Android App that you can find on the Google Play Store, having over 500M downloads.
dns-spoof
Version 1.0
dns-spoof es un script creado en bash de linux el cual permite automatizar la ejecucion de un ataque dnsspoof redireccionando a la victima de tu red a una pagina falsa (index.html) que configuremos en la ruta /var/www/html/ este ataque funciona sin problema para paginas HTTP para las paginas HTTPS NO HACE EL REDIRECCIONAMIENTO DNS ya que esta en su version 1.0.
para la ejecucion correcta del script se debe tener en cuenta tener en su sistema operativo de preferencia instalado:
Ettercap
Apache2
ArpSpoof
Dnsspoof
una vz lo anterior se encuentre instalado el script ejecutara automaticamente los comandos necesarios para montar el ataque por lo cual no es necesario configuraciones adicionales mas de las que pide el mismo script ya que solo seria para la configuracion del mismo ataque como la ip de la victima el router y la interface por donde se montara el ataque.
https://github.com/Anonimo501/dns-spoof.git
Version 1.0
dns-spoof es un script creado en bash de linux el cual permite automatizar la ejecucion de un ataque dnsspoof redireccionando a la victima de tu red a una pagina falsa (index.html) que configuremos en la ruta /var/www/html/ este ataque funciona sin problema para paginas HTTP para las paginas HTTPS NO HACE EL REDIRECCIONAMIENTO DNS ya que esta en su version 1.0.
para la ejecucion correcta del script se debe tener en cuenta tener en su sistema operativo de preferencia instalado:
Ettercap
Apache2
ArpSpoof
Dnsspoof
una vz lo anterior se encuentre instalado el script ejecutara automaticamente los comandos necesarios para montar el ataque por lo cual no es necesario configuraciones adicionales mas de las que pide el mismo script ya que solo seria para la configuracion del mismo ataque como la ip de la victima el router y la interface por donde se montara el ataque.
https://github.com/Anonimo501/dns-spoof.git
GitHub
GitHub - Anonimo501/dns-spoof
Contribute to Anonimo501/dns-spoof development by creating an account on GitHub.
CERRAR SESIÓN
UNDERDOCS.
En esta edición disfruten de:
• Noticias Informáticas
• Hacking
• Malware
• Seguridad Informática
• Pentesting
• [In]Seguridad Informática
• Raspberry Pi
• CTF/Retos (Soluciones)
• Las Ediciones de UnderDOCS
• UNDERTOOLS DIY
• OFF TOPIC
📌 https://underc0de.org/foro/e-zines/underdocs-julio-2020-numero-12/msg141096/#msg141096
UNDERDOCS.
En esta edición disfruten de:
• Noticias Informáticas
• Hacking
• Malware
• Seguridad Informática
• Pentesting
• [In]Seguridad Informática
• Raspberry Pi
• CTF/Retos (Soluciones)
• Las Ediciones de UnderDOCS
• UNDERTOOLS DIY
• OFF TOPIC
📌 https://underc0de.org/foro/e-zines/underdocs-julio-2020-numero-12/msg141096/#msg141096
eLearnSecurity - all courses
https://drive.google.com/drive/mobile/folders/1spMmQMAKdL1olmfGcxY_YPg0YAZx1hQU
https://drive.google.com/drive/mobile/folders/1spMmQMAKdL1olmfGcxY_YPg0YAZx1hQU
This media is not supported in your browser
VIEW IN TELEGRAM
Gracias a todos por estar suscritos al canal.
Un saludo y no olviden compartir.
Pd:
Gracias tambien a quienes ayudan compartiendo un saludo muy especial
Un saludo y no olviden compartir.
Pd:
Gracias tambien a quienes ayudan compartiendo un saludo muy especial
An unpatched critical zero-day arbitrary code execution vulnerability has been discovered in Zoom video conferencing software exploitable on Microsoft Windows 7 or older operating system.
Details: https://thehackernews.com/2020/07/zoom-windows-security.html
Details: https://thehackernews.com/2020/07/zoom-windows-security.html
Junos Space 16.1R1.7
vCPU : 1
RAM : 16384 MB (16GB)
qemu : x86_64
console : telnet
option : -smp 4 -nographic
note :
16 GB RAM is the bare minimum; you should use 32/64 GB in production deplyments. Default credentials: - CLI: admin / abc123 - WebUI: super / juniper123
Tested on GNS3 & EVE-NG
https://drive.google.com/open?id=1IwOcet_kZ_QBXyxDLseNU58yyxT598DO
vCPU : 1
RAM : 16384 MB (16GB)
qemu : x86_64
console : telnet
option : -smp 4 -nographic
note :
16 GB RAM is the bare minimum; you should use 32/64 GB in production deplyments. Default credentials: - CLI: admin / abc123 - WebUI: super / juniper123
Tested on GNS3 & EVE-NG
https://drive.google.com/open?id=1IwOcet_kZ_QBXyxDLseNU58yyxT598DO
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlt-ise-strd-xss-nqFhTtx7?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Identity%20Services%20Engine%20Stored%20Cross-Site%20Scripting%20Vulnerabilities&vs_k=1
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface.
These vulnerabilities are due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need valid administrative credentials.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlt-ise-strd-xss-nqFhTtx7
Security Impact Rating: Medium
CVE: CVE-2020-3340
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlt-ise-strd-xss-nqFhTtx7?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Identity%20Services%20Engine%20Stored%20Cross-Site%20Scripting%20Vulnerabilities&vs_k=1
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface.
These vulnerabilities are due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need valid administrative credentials.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlt-ise-strd-xss-nqFhTtx7
Security Impact Rating: Medium
CVE: CVE-2020-3340
Cisco
Cisco Security Threat and Vulnerability Intelligence
The Cisco Security portal provides actionable intelligence for security threats and vulnerabilities in Cisco products and services and third-party products.
Remote Code Execution in Citrix ADC
https://swarm.ptsecurity.com/remote-code-execution-in-citrix-adc/
https://swarm.ptsecurity.com/remote-code-execution-in-citrix-adc/
PT SWARM
Remote Code Execution in Citrix ADC
Many of you have probably heard of the CVE-2019-19781 vulnerability that I discovered at the end of last year. It is a critical vulnerability in Citrix ADC that allows unauthorized users to execute arbitrary operating system commands. It caused quite a stir…
📃 "Ofuscando ficheros con PowerShell" https://www.flu-project.com/2020/06/ofuscando-ficheros-con-powershell.html
Flu Project | Zerolynx Cybersecurity Blog
Ofuscando ficheros con PowerShell
El otro dÃa, tras una pequeña investigación por Internet, descubrimos una herramienta que nos llamó la atención y que os traemos hoy en este post.
Una vulnerabilidad permite hackear una app rastreadora en smartwatch
https://unaaldia.hispasec.com/2020/07/una-vulnerabilidad-permite-hackear-una-app-rastreadora-en-smartwatch.html
https://unaaldia.hispasec.com/2020/07/una-vulnerabilidad-permite-hackear-una-app-rastreadora-en-smartwatch.html
Una al DÃa
Una vulnerabilidad permite hackear una app rastreadora en smartwatch — Una al DÃa
Cada vez son más las personas que sustituyen el reloj de toda la vida por un smartwatch que les permita hacer uso de funcionalidades que van bastante más allá del mero hecho de consultar la hora. E…