ya que en esta ocacion les muestro como actua con una prueba real y como crearlo donde les muestro actualmente una lista de todos los rasomware que existen actualmente y probamos un de los mas potente aparte de WannaCry . que con este termine infetandome yo entre otras maquinas ya que este video lo hago solo con fines "educativos para poder entender un poco mas su funcionamiento". mis recomendaciones serian si desiden hacer las pruebas en sus maquinas les recomiendo que configuren bien su maquinas virtual que no sea en modo compartido... https://www.youtube.com/watch?v=mXLD1_ocCc8
Cómo gestionar la privacidad de Windows 10 con Pritavezilla
https://hipertextual.com/2020/09/privatezilla-privacidad-windows-10
https://hipertextual.com/2020/09/privatezilla-privacidad-windows-10
Hipertextual
Privatezilla es la manera más simple de controlar la privacidad de Windows 10
La privacidad es algo muy importante que conviene cuidar y vigilar. Con Privatezilla podrás hacerlo sin problemas en Windows 10.
National Vulnerability Database
CVE-2020-25283
An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. BT manager allows attackers to bypass intended access restrictions on a certain mode. The LG ID is LVE-SMP-200021 (September 2020).
CVE-2020-25283
An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. BT manager allows attackers to bypass intended access restrictions on a certain mode. The LG ID is LVE-SMP-200021 (September 2020).
National Vulnerability Database
CVE-2020-25285
A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
CVE-2020-25285
A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
😈📡 Burp Suite Hacking course 👿
Bug Bounty and Web Hacking
1) Introduction
https://mega.nz/folder/eM8RkKDI#9SdZ2Xl2hVqBlcmZXtTCSA
2) Getting Started with Ethical Hacking Lab Setup
https://mega.nz/folder/HdtXgSbY#UMtTyZwueUKW2GwK7GG4xw
3) Getting Started with Bug Bounty Hunting
https://mega.nz/folder/SRlRQSrb#Nl3xNMhGS3hxU2cx0MoUyA
4) Getting Started with Burp Suite
https://mega.nz/folder/7MkjHQ7B#XRg5d6vl3kb8iqTS43bnAg
5) Burp Suite Tools Introductions
https://mega.nz/folder/TElzmADC#1oaSZ5wyUQ95sJep9b0UJg
6) Broken Authentication and Session Management
https://mega.nz/folder/iU1nmYqB#pYKw1uf68ghJKurXtCTxmQ
7) Insecure Direct Object Reference Vulnerability
https://mega.nz/folder/nA8zgIIT#RYoWjUwgLI9WVX0NsrxFnA
8) Security Miss Configuration Vulnerabilities
https://mega.nz/folder/KA9j2KLT#Vtn3GLuZyWR2gbDwTsuZQg
9) SQL Injection Vulnerabilities
https://mega.nz/folder/uBkXWSZS#1isYLVqGqob7Q0SLTFyssw
10) Cross Site Scripting(XSS) Vulnerability
https://mega.nz/folder/KU9BBQIJ#DKB3fTUMNXlfBLZYZE2JFg
11) Various Injection Vulnerabilities and Attacks
https://mega.nz/folder/zcsliIpb#x_NbLw7vCPK6b0vqhD4PWA
12) Cookie Session Vulnerability Crash
https://mega.nz/folder/iB8lRSDa#46GhOEVqXEfWwvwdN1-YMA😈📡 Burp Suite Hacking course 👿
Bug Bounty and Web Hacking
1) Introduction
https://mega.nz/folder/eM8RkKDI#9SdZ2Xl2hVqBlcmZXtTCSA
2) Getting Started with Ethical Hacking Lab Setup
https://mega.nz/folder/HdtXgSbY#UMtTyZwueUKW2GwK7GG4xw
3) Getting Started with Bug Bounty Hunting
https://mega.nz/folder/SRlRQSrb#Nl3xNMhGS3hxU2cx0MoUyA
4) Getting Started with Burp Suite
https://mega.nz/folder/7MkjHQ7B#XRg5d6vl3kb8iqTS43bnAg
5) Burp Suite Tools Introductions
https://mega.nz/folder/TElzmADC#1oaSZ5wyUQ95sJep9b0UJg
6) Broken Authentication and Session Management
https://mega.nz/folder/iU1nmYqB#pYKw1uf68ghJKurXtCTxmQ
7) Insecure Direct Object Reference Vulnerability
https://mega.nz/folder/nA8zgIIT#RYoWjUwgLI9WVX0NsrxFnA
8) Security Miss Configuration Vulnerabilities
https://mega.nz/folder/KA9j2KLT#Vtn3GLuZyWR2gbDwTsuZQg
9) SQL Injection Vulnerabilities
https://mega.nz/folder/uBkXWSZS#1isYLVqGqob7Q0SLTFyssw
10) Cross Site Scripting(XSS) Vulnerability
https://mega.nz/folder/KU9BBQIJ#DKB3fTUMNXlfBLZYZE2JFg
11) Various Injection Vulnerabilities and Attacks
https://mega.nz/folder/zcsliIpb#x_NbLw7vCPK6b0vqhD4PWA
12) Cookie Session Vulnerability Crash
https://mega.nz/folder/iB8lRSDa#46GhOEVqXEfWwvwdN1-YMA
Bug Bounty and Web Hacking
1) Introduction
https://mega.nz/folder/eM8RkKDI#9SdZ2Xl2hVqBlcmZXtTCSA
2) Getting Started with Ethical Hacking Lab Setup
https://mega.nz/folder/HdtXgSbY#UMtTyZwueUKW2GwK7GG4xw
3) Getting Started with Bug Bounty Hunting
https://mega.nz/folder/SRlRQSrb#Nl3xNMhGS3hxU2cx0MoUyA
4) Getting Started with Burp Suite
https://mega.nz/folder/7MkjHQ7B#XRg5d6vl3kb8iqTS43bnAg
5) Burp Suite Tools Introductions
https://mega.nz/folder/TElzmADC#1oaSZ5wyUQ95sJep9b0UJg
6) Broken Authentication and Session Management
https://mega.nz/folder/iU1nmYqB#pYKw1uf68ghJKurXtCTxmQ
7) Insecure Direct Object Reference Vulnerability
https://mega.nz/folder/nA8zgIIT#RYoWjUwgLI9WVX0NsrxFnA
8) Security Miss Configuration Vulnerabilities
https://mega.nz/folder/KA9j2KLT#Vtn3GLuZyWR2gbDwTsuZQg
9) SQL Injection Vulnerabilities
https://mega.nz/folder/uBkXWSZS#1isYLVqGqob7Q0SLTFyssw
10) Cross Site Scripting(XSS) Vulnerability
https://mega.nz/folder/KU9BBQIJ#DKB3fTUMNXlfBLZYZE2JFg
11) Various Injection Vulnerabilities and Attacks
https://mega.nz/folder/zcsliIpb#x_NbLw7vCPK6b0vqhD4PWA
12) Cookie Session Vulnerability Crash
https://mega.nz/folder/iB8lRSDa#46GhOEVqXEfWwvwdN1-YMA😈📡 Burp Suite Hacking course 👿
Bug Bounty and Web Hacking
1) Introduction
https://mega.nz/folder/eM8RkKDI#9SdZ2Xl2hVqBlcmZXtTCSA
2) Getting Started with Ethical Hacking Lab Setup
https://mega.nz/folder/HdtXgSbY#UMtTyZwueUKW2GwK7GG4xw
3) Getting Started with Bug Bounty Hunting
https://mega.nz/folder/SRlRQSrb#Nl3xNMhGS3hxU2cx0MoUyA
4) Getting Started with Burp Suite
https://mega.nz/folder/7MkjHQ7B#XRg5d6vl3kb8iqTS43bnAg
5) Burp Suite Tools Introductions
https://mega.nz/folder/TElzmADC#1oaSZ5wyUQ95sJep9b0UJg
6) Broken Authentication and Session Management
https://mega.nz/folder/iU1nmYqB#pYKw1uf68ghJKurXtCTxmQ
7) Insecure Direct Object Reference Vulnerability
https://mega.nz/folder/nA8zgIIT#RYoWjUwgLI9WVX0NsrxFnA
8) Security Miss Configuration Vulnerabilities
https://mega.nz/folder/KA9j2KLT#Vtn3GLuZyWR2gbDwTsuZQg
9) SQL Injection Vulnerabilities
https://mega.nz/folder/uBkXWSZS#1isYLVqGqob7Q0SLTFyssw
10) Cross Site Scripting(XSS) Vulnerability
https://mega.nz/folder/KU9BBQIJ#DKB3fTUMNXlfBLZYZE2JFg
11) Various Injection Vulnerabilities and Attacks
https://mega.nz/folder/zcsliIpb#x_NbLw7vCPK6b0vqhD4PWA
12) Cookie Session Vulnerability Crash
https://mega.nz/folder/iB8lRSDa#46GhOEVqXEfWwvwdN1-YMA
mega.nz
File folder on MEGA
A new Linux malware, dubbed 'CDRThief,' targets voice over IP (VoIP) softswitches in an attempt to steal phone call metadata.
Details: https://thehackernews.com/2020/09/linux-voip-softswitch-malware.html
Details: https://thehackernews.com/2020/09/linux-voip-softswitch-malware.html
National Vulnerability Database
CVE-2018-20432
D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.
CVE-2018-20432
D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.
National Vulnerability Database
CVE-2020-11881
An array index error in MikroTik RouterOS 6.41.3 through 6.46.5, and 7.x through 7.0 Beta5, allows an unauthenticated remote attacker to crash the SMB server via modified setup-request packets, aka SUP-12964.
CVE-2020-11881
An array index error in MikroTik RouterOS 6.41.3 through 6.46.5, and 7.x through 7.0 Beta5, allows an unauthenticated remote attacker to crash the SMB server via modified setup-request packets, aka SUP-12964.
Vulnerabilidades críticas en routers MoFi 4500
https://unaaldia.hispasec.com/2020/09/vulnerabilidades-criticas-en-routers-mofi-4500.html
https://unaaldia.hispasec.com/2020/09/vulnerabilidades-criticas-en-routers-mofi-4500.html
Una al Día
Vulnerabilidades críticas en routers MoFi 4500
Los routers MoFi 4500 fabricados por MoFi Network se encuentran afectados por varias vulnerabilidades que podrían incluso exponer un dispositivo de forma remota. Algunas de ellas permanecen sin parchear. El investigador de seguridad Rich Mirch de Critial…
Kali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal)
https://www.kali.org/news/kali-2020-3-release/
https://www.kali.org/news/kali-2020-3-release/
Kali Linux
Kali Linux 2020.3 Release (ZSH, Win-KeX, HiDPI & Bluetooth Arsenal)
Its that time of year again, time for another Kali Linux release! Quarter #3 - Kali Linux 2020.3. This release has various impressive updates, all of which are ready for immediate download or updating. A quick overview of what’s new since the last release…
Testing docker CVE scanners. Part 2.5 — Exploiting CVE scanners
https://medium.com/@matuzg/testing-docker-cve-scanners-part-2-5-exploiting-cve-scanners-b37766f73005
https://medium.com/@matuzg/testing-docker-cve-scanners-part-2-5-exploiting-cve-scanners-b37766f73005
Medium
Testing docker CVE scanners. Part 2.5 — Exploiting CVE scanners
TL;DR: Most CVE scanners are not defended against exploitation when running on untrusted code/docker images. Isolate them in your…
WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day
https://www.gosecure.net/blog/2020/09/08/wsus-attacks-part-2-cve-2020-1013-a-windows-10-local-privilege-escalation-1-day/
https://www.gosecure.net/blog/2020/09/08/wsus-attacks-part-2-cve-2020-1013-a-windows-10-local-privilege-escalation-1-day/
GoSecure
24/7 managed detection, response, and expert cybersecurity services - GoSecure
We provide around-the-clock threat detection and incident response, backed by expert consulting to keep your organization secure.
«Dispositivos conectados al cuerpo humano: peligro real de muerte.» https://derechodelared.com/dispositivos-conectados-al-cuerpo-humano/
Derecho de la Red
"Dispositivos conectados al cuerpo humano: peligro real de muerte." – Derecho de la Red
Los dispositivos médicos conectados requieren de especial antención. Los atacantes pueden matar a las personas o robar datos personales.
Varias vulnerabilidades fueron encontradas al escanear contenedores Docker
https://blog-desdelinux-net.cdn.ampproject.org/c/s/blog.desdelinux.net/varias-vulnerabilidades-fueron-encontradas-al-escanear-contenedores-docker/amp/
https://blog-desdelinux-net.cdn.ampproject.org/c/s/blog.desdelinux.net/varias-vulnerabilidades-fueron-encontradas-al-escanear-contenedores-docker/amp/
Desde Linux
Varias vulnerabilidades fueron encontradas al escanear contenedores Docker
Hace poco se dio a conocer mediante una publicación de blog, los resultados de las herramientas de prueba para identificar vulnerabilidades...
👾👾👾 Hola amigos! 👾👾👾
Les comparto un nuevo Vídeo en donde explico como usar algunas características de la herramienta Sublist3r para realizar enumeración de subdominios.
https://www.youtube.com/watch?v=QJQDWJ2_PRw
Les comparto un nuevo Vídeo en donde explico como usar algunas características de la herramienta Sublist3r para realizar enumeración de subdominios.
https://www.youtube.com/watch?v=QJQDWJ2_PRw
YouTube
Sublist3r - Enumeración de subdominios.
En esta ocasión, veremos como realizar enumeración de subdominios utilizando la herramienta Sublist3r.
Link Sublist3r [Github]:
https://github.com/aboul3la/Sublist3r
Deja tus dudas en los comentarios o en alguna de las redes sociales mencionadas, responderemos…
Link Sublist3r [Github]:
https://github.com/aboul3la/Sublist3r
Deja tus dudas en los comentarios o en alguna de las redes sociales mencionadas, responderemos…
Udemy- Complete Linux Course Become a Linux Professional
Download Here
https://mega.nz/folder/Xyg11JZZ
Decryption Key: I-brHXcw73khzpcysqyhrQ
Download Here
https://mega.nz/folder/Xyg11JZZ
Decryption Key: I-brHXcw73khzpcysqyhrQ
mega.nz
1.25 GB folder on MEGA
220 files and 19 subfolders