Comunidad Pen7esting
3.58K subscribers
510 photos
40 videos
142 files
5.08K links
Download Telegram
An unpatched critical zero-day arbitrary code execution vulnerability has been discovered in Zoom video conferencing software exploitable on Microsoft Windows 7 or older operating system.

Details: https://thehackernews.com/2020/07/zoom-windows-security.html
Junos Space 16.1R1.7
vCPU : 1
RAM : 16384 MB (16GB)
qemu : x86_64
console : telnet
option : -smp 4 -nographic

note :
16 GB RAM is the bare minimum; you should use 32/64 GB in production deplyments. Default credentials: - CLI: admin / abc123 - WebUI: super / juniper123

Tested on GNS3 & EVE-NG

https://drive.google.com/open?id=1IwOcet_kZ_QBXyxDLseNU58yyxT598DO
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlt-ise-strd-xss-nqFhTtx7?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Identity%20Services%20Engine%20Stored%20Cross-Site%20Scripting%20Vulnerabilities&vs_k=1

Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface.
These vulnerabilities are due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need valid administrative credentials.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlt-ise-strd-xss-nqFhTtx7



Security Impact Rating: Medium



CVE: CVE-2020-3340
Certified Ethical Hacker v10 Videos* 🔥

https://mega.nz/folder/RpkU1CxJ#DpnntJGwXjT1AdBYFO7CFw

Enjoy 👍
Hola espero esten bien.

Vuelvo y les dejo el script corregido de dns-spoof habia olvidado colocar el codigo de iptables para redireccionar a la pagina falsa por si alguno ensayo en script y no le funciono ya esta corregido.

https://github.com/Anonimo501/dns-spoof
Buenas noches.

Vengo a compartirles un script que termine hoy.

hack-wpa2 es una herramienta basada en bash de linux que utiliza la Suite de Aircrack para automatizar la configuracion y el ataque, tener en cuenta que el script no viene con diccionario.

Les dejo un saludo:
https://github.com/Anonimo501/hack-wpa2.git
Foto de A501
ULTIMATE HACKING PACKAGE

1. Cyber security analyst training

2. Cyber security advanced test detecting techniques

3. Cyber security Malicious software detector

4. Cyber security source code defender

5. Cyber security threat intelligence research

6. Cyber security web application defender

7. Cyber training 365 certified ethical Hacker

8. Cyber training 365 computer hacker and forensics

9. Cyber training 365 kali 101



Total size: 36.90 GB

https://mega.nz/folder/HGg2TCTA#CjyPNP3bktKV9w4_g2xUDg/folder/vfgiDK4T