Comunidad Pen7esting
3.58K subscribers
510 photos
40 videos
142 files
5.08K links
Download Telegram
Apple corrige 2 Zero-Day urgentes explotados In-the-Wild
https://blog.segu-info.com.ar/2021/06/apple-corrige-2-zero-day-urgentes.html
OTAN: la repetición de ciberataques podría equipararse a un ataque armado.

La OTAN va a la tratar los ciberataques «caso por caso» y puede considerarlos como un ataque armado e invocar el artículo 5 del Tratado del Atlántico Norte de 1949.

▶️ https://derechodelared.com/otan-la-repeticion-de-ciberataques-podria-equipararse-a-un-ataque-armado/
Cisco Jabber and Webex Client Software Shared File Manipulation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Jabber%20and%20Webex%20Client%20Software%20Shared%20File%20Manipulation%20Vulnerability&vs_k=1

A vulnerability in Cisco Jabber and Cisco Webex (formerly Teams) could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface.
The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99



Security Impact Rating: Medium



CVE: CVE-2021-1242
📝➡️ Tormap, el mapa con los nodos de la red Tor.

Es un proyecto que recopila información sobre todos los los nodos de la red Tor, de manera que podamos saber exactamente dónde se sitúan en el mundo.

▶️ https://derechodelared.com/tormap-mapa-nodos-de-la-red-tor/
ExploitDB Just tweeted ****************************************** [webapps] Online Shopping Portal 3.1 - Remote Code Execution (Unauthenticated) https://t.co/SwiRQSFBB7
Usted escanea este segmento de red y usted este otro, así adelantamos y luego juntamos todo, no creo que pase nada raro… https://t.co/dKZspw644g
VMware Tools for Windows update addresses a denial-of-service vulnerability (CVE-2021-21997)

Advisory ID: VMSA-2021-0011
CVSSv3 Range: 3.3
Issue Date: 2021-06-17

https://www.vmware.com/security/advisories/VMSA-2021-0011.html
https://www.eshoy.cl/2021/06/16/ciberseguridad-en-chile-amenazas-latentes-y-nuevos-desafios/
16 de Junio: entrevista de @Fr33b0l4

Ciberseguridad, Entrevistas & Reportajes
Ciberseguridad en Chile: Amenazas latentes y nuevos desafíos
📨 ➡️ El Centro de Inteligencia de las Fuerzas Armadas (CIFAS) incorporará a analistas, informáticos y expertos en big data

Según ha podido saber Confidencial Digital, el CIFAS prepara contratos de larga duración para estos trabajadores civiles, que espera tener listos en tres años.

Fuentes militares explican que es más rentable para las Fuerzas Armadas contar con profesionales civiles para cubrir dichas necesidades que invertir en la formación de los efectivos.

https://www.elconfidencialdigital.com/articulo/defensa/inteligencia-militar-incorporara-civiles-contratos-larga-duracion/20210611093344250901.html
🔰 USEFUL WEBSITES FOR PENTESTERS & HACKERS
__________________
Exploits Database 💥

http://www.exploit-db.com/
http://www.intelligentexploit.com
http://www.shodanhq.com/
http://packetstormsecurity.com/

Vulnerabilities Database 🎯

https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://nvd.nist.gov/
http://osvdb.org/
https://www.kb.cert.org/vuls/
https://secunia.com/community/advisories/search/
http://www.securityfocus.com/bid
http://lwn.net/Vulnerabilities/
http://denimgroup.com/resources-threadfix/
http://www.vulnerability-lab.com
http://www.secdocs.org/

Hacking Tutorials 💻

https://www.offensive-security.com/
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials
http://www.hacking-tutorial.com/
http://breakthesecurity.cysecurity.org/
http://www.securitytube.net/
http://www.ehacking.net/
https://vimeo.com/channels/fullscopesecurity
http://www.spacerogue.net/wordpress/

Virus Scan 🦠

https://www.virustotal.com/nl/
http://anubis.iseclab.org/
http://virusscan.jotti.org/it
--Not distribute to AV--
http://v2.scan.majyx.net/?page=home
http://fuckingscan.me/
https://anonscanner.com/
http://nodistribute.com/
http://www.file2scan.net/

Tools Download 🛠

http://tools.kali.org/tools-listing
http://insecure.org/
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
http://www.darknet.org.uk/category/hacking-tools/
http://www.kitploit.com/
http://www.toolswatch.org/
http://www.blackarch.org/tools.html
https://pentest-tools.com/reconnaissance/google-hacking
https://gexos.github.io/Hacking-Tools-Repository/
http://www.romhacking.net/utilities/
Network Online Tools 🌐
http://www.yougetsignal.com/
http://www.dnswatch.info/
http://www.nirsoft.net/countryip/
http://www.tcpiputils.com/
http://www.coffer.com/mac_find/
http://bgp.he.net/
http://www.sockets.com/services.htm
http://services.ce3c.be/ciprg/

IP Lookup 🔎

http://ip-api.com/#
http://www.my-ip-neighbors.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://freegeoip.net/static/index.html
http://whatstheirip.com
http://ipaddress.com
http://www.ip-adress.com/ipaddresstolocation/

Encrypt / Decrypt

http://crypo.in.ua/tools/
http://www.tools4noobs.com/online_tools/decrypt/
http://codebeautify.org/encrypt-decrypt
http://textmechanic.com/Encryption-Generator.html
http://www.yellowpipe.com/yis/tools/encrypter/

Online Hash Crackers 🧱

http://www.hashkiller.co.uk/
http://www.md5online.org/
http://www.cmd5.org/
http://www.md5crack.com/
http://www.netmd5crack.com/cracker/
http://md5decryption.com/
http://md5.rednoize.com/
http://www.md5this.com/index.php
http://www.tydal.nu/article/md5-crack/
http://passcracking.com/
https://hdb.insidepro.com/en
https://crackstation.net/
http://www.cloudcracker.net/
https://isc.sans.edu/tools/reversehash.html
http://www.onlinehashcrack.com/ [$]
http://hashcrack.in/en [$]

File Upload 📁

https://mega.co.nz/
https://www.mediafire.com/
https://infotomb.com/m/welcome
http://sharesend.com/
http://www.wss-coding.com/upload
http://zippyshare.com/
http://filetolink.com/
http://ge.tt/
http://largedocument.com/
http://rghost.net/
http://dox.abv.bg/files/share
http://secureupload.eu/

Anonymous Test 🕵

https://ipleak.net/
https://www.dnsleaktest.com/
https://diafygi.github.io/webrtc-ips/

Torcheck 🧅

http://5deqglhxcoy3gbx6.onion - Xenobite
http://tmkloc6vhxos3nde.onion
SMS 📩
http://receive-sms-now.com/
http://www.receive-sms-online.info/
http://www.receivesmsonline.net/

Fake Identity 🙃

http://www.fakenamegenerator.com/
https://fakena.me/
http://names.igopaygo.com/people/fake_person


🛡 Comunidad Anonimo501 💻📱🖥
https://t.me/Pen7esting
📃 "Herramientas OSINT: Una recopilación de tools para obtener datos y convertirlos en ciberinteligencia" https://derechodelared.com/herramientas-osint-recopilatorio/ by @derechodelared

🛠 Google Dorks https://www.exploit-db.com/google-hacking-database https://www.sans.org/security-resources/GoogleCheatSheet.pdf
🛠 Bing Dorks
🛠 Shodan https://www.shodan.io/
🛠 Maltego https://www.maltego.com/
🛠 TheHarvester https://github.com/laramies/theHarvester
🛠 Recon-ng https://github.com/lanmaster53/recon-ng
🛠 Censys https://censys.io/
🛠 Crt.sh https://crt.sh/
🛠 Creepy https://www.geocreepy.com/
🛠 DnsDumpster https://dnsdumpster.com/
🛠 Spyse https://spyse.com/
🛠 Metagoofil https://github.com/laramies/metagoofil
🛠 FOCA https://github.com/ElevenPaths/FOCA
🛠 Ipinfo.io https://ipinfo.io/
🛠 WaybackMachine (archive.org) https://archive.org/
🛠 Osintgram https://github.com/Datalux/Osintgram
🛠 Spiderfoot https://www.spiderfoot.net/
🛠 Google Imagenes (Búsqueda inversa)
🛠 Tinfoleak https://www.isecauditors.com/herramientas-tinfoleak
🛠 Wappalyzer https://www.wappalyzer.com/
🛠 OSINT Framework https://osintframework.com/

En el artículo encontraréis más detalles de estas herramientas, además de un extra informativo al final https://derechodelared.com/herramientas-osint-recopilatorio/