📃 "Botnet, la red Zombie" https://pixelmuerto.com/post/620069211263369216/botnet-la-red-zombie
>>Pixel Muerto
Botnet, la red Zombie
Hoy quería traeros un post en el que no hacer instrucciones y no usar herramientas. Hoy simplemente quería hablar de algo que la verdad me llama mucho la atención y quería dedicarle un post, el asunto...
Research/BlackHat 2020:
"EtherOops - Exploit Utilizing Packet-in-Packet Attacks on Ethernet Cables To Bypass Firewalls & NATs" (PoC)
https://www.armis.com/etheroops/
"EtherOops - Exploit Utilizing Packet-in-Packet Attacks on Ethernet Cables To Bypass Firewalls & NATs" (PoC)
https://www.armis.com/etheroops/
Armis
ETHEROOPS
EtherOops includes methods to exploit packet-in-packet attacks in Ethernet cables. Discover how to develop mitigations in your network infrastructure.
⚙️ "Cómo robar el pin de android y el código de iphone de su amigo con un enlace único" https://noticiasseguridad.com/tutoriales/como-robar-el-pin-de-android-y-el-codigo-de-iphone-de-su-amigo-con-un-enlace-unico/
Noticias de seguridad informática, ciberseguridad y hacking
CÓMO ROBAR EL PIN DE ANDROID Y EL CÓDIGO DE IPHONE O ANDROID DE SU AMIGO CON UN ENLACE ÚNICO
CÓMO ROBAR EL PIN DE ANDROID Y EL CÓDIGO DE IPHONE O ANDROID DE SU AMIGO CON UN ENLACE ÚNICO - Tutoriales
CVE-2020-3702:
"Kr00k2" - Qualcomm, MediaTek Wi-Fi Chips Vulnerable to Kr00k-Like Attacks
https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/
Testing script:
https://github.com/eset/malware-research/tree/master/kr00k
"Kr00k2" - Qualcomm, MediaTek Wi-Fi Chips Vulnerable to Kr00k-Like Attacks
https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/
Testing script:
https://github.com/eset/malware-research/tree/master/kr00k
WeLiveSecurity
Beyond KrØØk: Even more Wi‑Fi chips vulnerable to eavesdropping
Following their discovery of the KrØØk vulnerability, ESET researchers reveal that variants of the same flaw affect even more Wi-Fi chips than initially thought.
Research:
"18 Attacks on Email Sender Authentication"
https://www.blackhat.com/us-20/briefings/schedule/#you-have-no-idea-who-sent-that-email--attacks-on-email-sender-authentication-19902
An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures:
https://github.com/chenjj/espoofer
"18 Attacks on Email Sender Authentication"
https://www.blackhat.com/us-20/briefings/schedule/#you-have-no-idea-who-sent-that-email--attacks-on-email-sender-authentication-19902
An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures:
https://github.com/chenjj/espoofer
Blackhat
Black Hat USA 2020
Presentadas cuatro nuevas variantes de HTTP Request Smuggling en BlackHat 2020
https://unaaldia.hispasec.com/2020/08/presentadas-cuatro-nuevas-variantes-de-http-request-smuggling-en-blackhat-2020.html
https://unaaldia.hispasec.com/2020/08/presentadas-cuatro-nuevas-variantes-de-http-request-smuggling-en-blackhat-2020.html
Una al Día
Presentadas cuatro nuevas variantes de HTTP Request Smuggling en BlackHat 2020
Tras 15 años de su descubrimiento, se han encontrado nuevas variantes de este tipo de ataque en Abyss X1, Squirt y CRS en conjunto con servidores tan populares como IIS, Apache o Tomcat
SCADA Security/Research:
Infiltrating your home IoT network using a malicious ZigBee lightbulb (CVE-2020-6007) (PoC)
https://research.checkpoint.com/2020/dont-be-silly-its-only-a-lightbulb/
Infiltrating your home IoT network using a malicious ZigBee lightbulb (CVE-2020-6007) (PoC)
https://research.checkpoint.com/2020/dont-be-silly-its-only-a-lightbulb/
Check Point Research
Don’t be silly - it’s only a lightbulb - Check Point Research
Research by: Eyal Itkin Background Everyone is familiar with the concept of IoT, the Internet of Things, but how many have heard of smart lightbulbs? You can control the light in your house, and even calibrate the color of each lightbulb, just by using a…
TODOS LOS 49 GB LINUX PRO POR CERTIFICADOS WHITEHATS 2020 CURSO
https://mega.nz/folder/3dkjkJSa#BLyY2ufMT25ng2-bPhw7Tw
https://mega.nz/folder/3dkjkJSa#BLyY2ufMT25ng2-bPhw7Tw
mega.nz
File folder on MEGA
Warning: If you're using TeamViewer, make sure it's updated to the latest version.
TeamViewer recently patched a new vulnerability that could let remote attackers steal your system login credentials and compromise it—just convincing you into visiting a malicious web page once.
Read details: https://thehackernews.com/2020/08/teamviewer-password-hacking.html
TeamViewer recently patched a new vulnerability that could let remote attackers steal your system login credentials and compromise it—just convincing you into visiting a malicious web page once.
Read details: https://thehackernews.com/2020/08/teamviewer-password-hacking.html
The Hacker News
TeamViewer Flaw Could Let Hackers Steal System Password Remotely
A new vulnerability (CVE 2020-13699) affecting TeamViewer software could let hackers steal your system login password remotely.
🎥"El mejor adivino de la historia" https://youtu.be/NR279FlzD4s
Malware analysis:
1. Infecting macOS via macro-laden documents and 0days (PoC)
https://objective-see.com/blog/blog_0x4B.html
2. A Fork of the FTCode Powershell Ransomware
https://isc.sans.edu/forums/diary/A+Fork+of+the+FTCode+Powershell+Ransomware/26434
1. Infecting macOS via macro-laden documents and 0days (PoC)
https://objective-see.com/blog/blog_0x4B.html
2. A Fork of the FTCode Powershell Ransomware
https://isc.sans.edu/forums/diary/A+Fork+of+the+FTCode+Powershell+Ransomware/26434
Objective-See
Office Drama on macOS
infecting macOS via macro-laden documents and 0days
Creación de payloads cifrados en Powershell con Xeca
https://www.hackplayers.com/2020/08/payloads-cifrados-ps-con-xeca.html
https://www.hackplayers.com/2020/08/payloads-cifrados-ps-con-xeca.html
Hackplayers
Creación de payloads cifrados en Powershell con Xeca
Xeca es un proyecto que crea payloads cifrados de PowerShell con fines ofensivos. También es posible crear shellcodes independientes a part...
Ghostscript (rendering engine for Postscript/PDF content) ver.9.50 - 9.52 SAFER Sandbox Breakout (CVE-2020-15900) (PoC)
https://insomniasec.com/blog/ghostscript-cve-2020-15900
https://insomniasec.com/blog/ghostscript-cve-2020-15900
Procesadores Intel, ARM, IBM y AMD vulnerables a nuevos ataques de canal lateral
https://unaaldia.hispasec.com/2020/08/procesadores-intel-arm-ibm-y-amd-vulnerables-a-nuevos-ataques-de-canal-lateral.html
https://unaaldia.hispasec.com/2020/08/procesadores-intel-arm-ibm-y-amd-vulnerables-a-nuevos-ataques-de-canal-lateral.html
Una al Día
Procesadores Intel, ARM, IBM y AMD vulnerables a nuevos ataques de canal lateral - Una al Día
Según una nueva investigación, se atribuyó erróneamente al ‘prefetching effect ‘ la causa principal de varios ataques de ejecución especulativa revelados anteriormente contra procesadores modernos, como Meltdown y Foreshadow , lo que provocó que los proveedores…
PDF Test Security Suite:
- comprehensive test suite of malicious PDF documents;
- actual exploit files for 28 tested PDF applications;
- results for evitable metadata and revision recovery;
- results from crawling the Cisco Umbrella 1m domains;
- helper scripts to generate testcases, deflate.
https://github.com/RUB-NDS/PDF101
- comprehensive test suite of malicious PDF documents;
- actual exploit files for 28 tested PDF applications;
- results for evitable metadata and revision recovery;
- results from crawling the Cisco Umbrella 1m domains;
- helper scripts to generate testcases, deflate.
https://github.com/RUB-NDS/PDF101
Aplicar técnicas OSINT en indicadores de compromiso detectados en los SIEM
http://feedproxy.google.com/~r/GuruDeLaInformtica/~3/RyunUr_wLgs/aplicar-tecnicas-osint-en-indicadores-de-compromiso-detectados-en-los-siem
http://feedproxy.google.com/~r/GuruDeLaInformtica/~3/RyunUr_wLgs/aplicar-tecnicas-osint-en-indicadores-de-compromiso-detectados-en-los-siem
GURÚ DE LA INFORMÁTICA
Aplicar técnicas OSINT en indicadores de compromiso detectados en los SIEM - GURÚ DE LA INFORMÁTICA
Udacity Data science (All courses)
Download link:-
https://mega.nz/folder/qrpxSIRD#PClG5ZMHdd5FroIFTT_Z5Q
Download link:-
https://mega.nz/folder/qrpxSIRD#PClG5ZMHdd5FroIFTT_Z5Q
mega.nz
File folder on MEGA
🔥 Watch Out! A new critical vBulletin zero-day RCE vulnerability and its PoC exploits have been publicly disclosed, allowing attackers to bypass patch for an old RCE bug (CVE-2019-16759) and remotely compromise sites.
Details — https://thehackernews.com/2020/08/vBulletin-vulnerability-exploit.html
Details — https://thehackernews.com/2020/08/vBulletin-vulnerability-exploit.html