Cómo explotar una vulnerabilidad de DLL Hijacking en Slack para Windows
http://feedproxy.google.com/~r/ElLadoDelMal/~3/qZGiMhshWK8/como-explotar-una-vulnerabilidad-de-dll.html
http://feedproxy.google.com/~r/ElLadoDelMal/~3/qZGiMhshWK8/como-explotar-una-vulnerabilidad-de-dll.html
Elladodelmal
Cómo explotar una vulnerabilidad de DLL Hijacking en Slack para Windows
Blog personal de Chema Alonso, CDCO Telefónica, 0xWord, MyPublicInbox, sobre seguridad, hacking, hackers y Cálico Electrónico.
The United States government has declared emergency in 17 states and D.C. over a cyberattack on a major fuel pipeline company.
Read: https://thehackernews.com/2021/05/us-declares-emergency-in-17-states-over.html
Read: https://thehackernews.com/2021/05/us-declares-emergency-in-17-states-over.html
The Hacker News
U.S. Declares Emergency in 17 States Over Fuel Pipeline Cyber Attack
17 U.S. states have issued an emergency declaration because of a cyber attack on fuel pipelines.
Vulnerabilidad SQL Injection parcheada en plugin AntiSpam instalado en más de 100.000 WordPress
https://unaaldia.hispasec.com/2021/05/vulnerabilidad-sql-injection-parcheada-en-plugin-antispam-instalado-en-mas-de-100-000-wordpress.html
https://unaaldia.hispasec.com/2021/05/vulnerabilidad-sql-injection-parcheada-en-plugin-antispam-instalado-en-mas-de-100-000-wordpress.html
Una al Día
Vulnerabilidad SQL Injection parcheada en plugin AntiSpam de 100.000 WordPress
El equipo de Wordfence descubrió recientemente una vulnerabilidad Time-Based Blind SQL Injection en un conocido plugin AntiSpam de WordPress
ExploitDB Just tweeted ****************************************** [webapps] Chevereto 3.17.1 - Cross Site Scripting (Stored) https://t.co/m9Td2plyvF
Exploit Database
Chevereto 3.17.1 - Cross Site Scripting (Stored)
Chevereto 3.17.1 - Cross Site Scripting (Stored).. webapps exploit for Multiple platform
Más del 25% de los nodos de salida Tor espiaron a sus usuarios
https://unaaldia.hispasec.com/2021/05/mas-del-25-de-los-nodos-de-salida-tor-espiaron-a-sus-usuarios.html
https://unaaldia.hispasec.com/2021/05/mas-del-25-de-los-nodos-de-salida-tor-espiaron-a-sus-usuarios.html
Una al Día
Más del 25% de los nodos de salida Tor espiaron a sus usuarios
Se ha revelado que una entidad desconocida tuvo el control de hasta un 27% de los nodos de salida de la red Tor en febrero de 2021.
📃 "Mapas y ransomware: REvil, Acer y algunas cosas más" https://unaaldia.hispasec.com/2021/03/mapas-y-ransomware-revil-acer-y-algunas-cosas-mas.html
📃 "Análisis del ransomware REvil (Sodinokibi)" https://blog.segu-info.com.ar/2021/03/analisis-de-ransomware-sodinokibi-revil.html
📃 "Análisis del ransomware REvil (Sodinokibi)" https://blog.segu-info.com.ar/2021/03/analisis-de-ransomware-sodinokibi-revil.html
Una al Día
Mapas y ransomware: REvil, Acer y algunas cosas más
Acer, una de las últimas empresas afectadas por REvil, a la que han dado de plazo hasta el 28 de marzo para que pague un rescate.
CVE-2021-1079: NVIDIA GeForce Experience (GFE) v.<= 3.21 Arbitrary File Write to EoP Command Execution. https://t.co/mVCyqIqaDH
Relaying Potatoes: Another Unexpected Privilege Escalation Vulnerability in Windows RPC Protocol
https://labs.sentinelone.com/relaying-potatoes-dce-rpc-ntlm-relay-eop
]-> Windows Privilege Escalation from User to Domain Admin 1-day PoC:
https://github.com/antonioCoco/RemotePotato0
https://labs.sentinelone.com/relaying-potatoes-dce-rpc-ntlm-relay-eop
]-> Windows Privilege Escalation from User to Domain Admin 1-day PoC:
https://github.com/antonioCoco/RemotePotato0
SentinelOne
Relaying Potatoes: Another Unexpected Privilege Escalation Vulnerability in Windows RPC Protocol - SentinelLabs
A newly-discovered NTLM relay attack makes every Windows system vulnerable to an escalation of privileges attack, and there's no patch in sight.
Parallels Desktop RDPMC Hypercall Interface
and Vulnerabilities (PoC for CVE-2021-31424,
CVE-2021-31427 in UEFI variable services)
https://www.zerodayinitiative.com/blog/2021/4/26/parallels-desktop-rdpmc-hypercall-interface-and-vulnerabilities
and Vulnerabilities (PoC for CVE-2021-31424,
CVE-2021-31427 in UEFI variable services)
https://www.zerodayinitiative.com/blog/2021/4/26/parallels-desktop-rdpmc-hypercall-interface-and-vulnerabilities
Zero Day Initiative
Zero Day Initiative — Parallels Desktop RDPMC Hypercall Interface and Vulnerabilities
Parallels Desktop implements a hypercall interface using an RDPMC instruction (“Read Performance-Monitoring Counter”) for communication between guest and host. More interestingly, this interface is accessible even to an unprivileged guest user. Though the…
#Threat_Research
Exploiting memory corruption vulnerabilities on Android
https://blog.oversecured.com/Exploiting-memory-corruption-vulnerabilities-on-Android
Exploiting memory corruption vulnerabilities on Android
https://blog.oversecured.com/Exploiting-memory-corruption-vulnerabilities-on-Android
News, Techniques & Guides
Exploiting memory corruption vulnerabilities on Android
In today's blog, we'll discuss memory corruption vulnerabilities in Android apps and how they can be exploited. At the end of the article, we'll show how we found such a vulnerability in PayPal apps and what the result could be.
#exploit
Windows 8.1 IE/Firefox RCE -> Sandbox Escape -> SYSTEM EoP Exploit Chain
https://github.com/forrest-orr/DoubleStar
Windows 8.1 IE/Firefox RCE -> Sandbox Escape -> SYSTEM EoP Exploit Chain
https://github.com/forrest-orr/DoubleStar
GitHub
GitHub - forrest-orr/DoubleStar: A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus…
A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques - forrest-orr/DoubleStar
#exploit
CVE-2021-28312:
Windows 10 1809/1909/2004/20H2, Server 2019 - NTFS DoS Vulnerability (PoC)
https://github.com/shubham0d/CVE-2021-28312
CVE-2021-28312:
Windows 10 1809/1909/2004/20H2, Server 2019 - NTFS DoS Vulnerability (PoC)
https://github.com/shubham0d/CVE-2021-28312
GitHub
GitHub - shubham0d/CVE-2021-28312: POC and description for CVE-2021-28312
POC and description for CVE-2021-28312. Contribute to shubham0d/CVE-2021-28312 development by creating an account on GitHub.
#Offensive_security
Micro Backdoor for Windows:
Small and convenient C2 tool for Windows targets
https://github.com/Cr4sh/MicroBackdoor
Micro Backdoor for Windows:
Small and convenient C2 tool for Windows targets
https://github.com/Cr4sh/MicroBackdoor
GitHub
GitHub - Cr4sh/MicroBackdoor: Small and convenient C2 tool for Windows targets
Small and convenient C2 tool for Windows targets. Contribute to Cr4sh/MicroBackdoor development by creating an account on GitHub.
ExploitDB Just tweeted ****************************************** [webapps] Microsoft Exchange 2019 - Unauthenticated Email Download https://t.co/tgIWJ60sqw
Exploit Database
Microsoft Exchange 2019 - Unauthenticated Email Download
Microsoft Exchange 2019 - Unauthenticated Email Download. CVE-2021-26855 . webapps exploit for Windows platform
Familia les traigo un script que he creado para pentesting en entornos de directorio activo AD para realizar el ataque de samba relay de manera automatizada con el siguiente script que deje en el Github.
https://github.com/Anonimo501/SambaRelay
Un saludo.
https://github.com/Anonimo501/SambaRelay
Un saludo.
GitHub
GitHub - Anonimo501/SambaRelay
Contribute to Anonimo501/SambaRelay development by creating an account on GitHub.
😁1
Comunidad Pen7esting
Familia les traigo un script que he creado para pentesting en entornos de directorio activo AD para realizar el ataque de samba relay de manera automatizada con el siguiente script que deje en el Github. https://github.com/Anonimo501/SambaRelay Un saludo.
Hi.
El script ha Sido actualizando por si desean ir a hechar le un vistazo.
El script ha Sido actualizando por si desean ir a hechar le un vistazo.
ExploitDB Just tweeted ****************************************** [webapps] Microsoft Exchange 2019 - Unauthenticated Email Download (Metasploit) https://t.co/V1DhiHjVzH
Exploit Database
Microsoft Exchange 2019 - Unauthenticated Email Download (Metasploit)
Microsoft Exchange 2019 - Unauthenticated Email Download (Metasploit). CVE-2021-26855 . webapps exploit for Windows platform
ExploitDB Just tweeted ****************************************** [remote] Solaris SunSSH 11.0 x86 - libpam Remote Root (2) https://t.co/lp3DfmUMBv
Exploit Database
Solaris SunSSH 11.0 x86 - libpam Remote Root (2)
Solaris SunSSH 11.0 x86 - libpam Remote Root (2). CVE-2020-14871 . remote exploit for Solaris platform