AllHackingTools: ¡Herramientas de hacking todo en uno para hackers! ¡En termux y linux! 😎
https://github.com/mishakorzik/AllHackingTools?_unique_id=60f07a9e5c5ef
https://github.com/mishakorzik/AllHackingTools?_unique_id=60f07a9e5c5ef
GitHub
GitHub - mishakorzik/AllHackingTools: All-in-One Hacking Tools For Hackers! And more hacking tools! In termux and linux!
All-in-One Hacking Tools For Hackers! And more hacking tools! In termux and linux! - GitHub - mishakorzik/AllHackingTools: All-in-One Hacking Tools For Hackers! And more hacking tools! In termux a...
MÉTODOS PRINCIPALES PARA FALSIFICAR UNA URL Y ATACAR
https://www.redeszone.net/tutoriales/seguridad/uso-enlaces-falsos-atacar-malware/
https://www.redeszone.net/tutoriales/seguridad/uso-enlaces-falsos-atacar-malware/
Redes Zone
Métodos principales para falsificar una URL y enviar malware al usuario
Los ciberdelincuentes pueden hacer uso de métodos muy variados para atacar a las víctimas. Utilizan software malicioso y estrategias con el objetivo de robar información, contraseñas y, en definitiva, provocar un mal funcionamiento de los sistemas. Algo muy…
📝➡️ Guía para crear buenas contraseñas.
Esta guía pretende aportar consejos sobre el establecimiento de contraseñas seguras y gestores de contraseñas que ayuden al usuario a recordar cada una de ellas.
https://derechodelared.com/guia-crear-buenas-contrasenas/
Esta guía pretende aportar consejos sobre el establecimiento de contraseñas seguras y gestores de contraseñas que ayuden al usuario a recordar cada una de ellas.
https://derechodelared.com/guia-crear-buenas-contrasenas/
Derecho de la Red
Guía para crear buenas contraseñas.
Esta guía pretende aportar consejos sobre como crear buenas contraseñas e información sobre gestores de contraseñas.
Forwarded from Bitácora Crackslatinos [Canal]
Media is too big
VIEW IN TELEGRAM
#Ponencia_de_Nox acerca de la vuln CVE-2021-34527
PrintNigthmare
PrintNigthmare
Cisco FXOS and NX-OS Software Simple Network Management Protocol Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-snmp-dos?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20FXOS%20and%20NX-OS%20Software%20Simple%20Network%20Management%20Protocol%20Denial%20of%20Service%20Vulnerability&vs_k=1
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the SNMP application to leak system memory, which could cause an affected device to restart unexpectedly.
The vulnerability is due to improper error handling when processing inbound SNMP packets. An attacker could exploit this vulnerability by sending multiple crafted SNMP packets to an affected device. A successful exploit could allow the attacker to cause the SNMP application to leak system memory because of an improperly handled error condition during packet processing. Over time, this memory leak could cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-snmp-dos
Security Impact Rating: High
CVE: CVE-2019-1858
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-snmp-dos?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20FXOS%20and%20NX-OS%20Software%20Simple%20Network%20Management%20Protocol%20Denial%20of%20Service%20Vulnerability&vs_k=1
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the SNMP application to leak system memory, which could cause an affected device to restart unexpectedly.
The vulnerability is due to improper error handling when processing inbound SNMP packets. An attacker could exploit this vulnerability by sending multiple crafted SNMP packets to an affected device. A successful exploit could allow the attacker to cause the SNMP application to leak system memory because of an improperly handled error condition during packet processing. Over time, this memory leak could cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-snmp-dos
Security Impact Rating: High
CVE: CVE-2019-1858
Cisco
Cisco Security Advisory: Cisco FXOS and NX-OS Software Simple Network Management Protocol Denial of Service Vulnerability
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the SNMP application to leak system memory, which could cause…
Pentester e Intrusión en un sistema Versus Analista Forense y Detección de Intrusión (Parte I de III)
http://feedproxy.google.com/~r/elladodelmal/~3/WnxXgyOxNYA/pentester-e-intrusion-en-un-sistema.html
http://feedproxy.google.com/~r/elladodelmal/~3/WnxXgyOxNYA/pentester-e-intrusion-en-un-sistema.html
Elladodelmal
Pentester e Intrusión en un sistema Versus Analista Forense y Detección de Intrusión (Parte I de III)
Blog personal de Chema Alonso, CDCO Telefónica, 0xWord, MyPublicInbox, sobre seguridad, hacking, hackers y Cálico Electrónico.
EvilNet: Ataque de Red WiFi, VLAN, ARP, MAC
https://esgeeks.com/evilnet-ataque-red-wifi-vlan-arp-mac/?feed_id=259&_unique_id=5effde9f42340
https://esgeeks.com/evilnet-ataque-red-wifi-vlan-arp-mac/?feed_id=259&_unique_id=5effde9f42340
EsGeeks
▷ EvilNet: Ataque de Red WiFi, VLAN, ARP, MAC » EsGeeks
|➨ EvilNet es una herramienta para ataque a redes, específicamente a nivel de capa 2: Inundación MAC, Salto de VLAN o un ataque ARP. ✅
🔧 Tool
EvilNet – Network Attack Wifi Attack Vlan Attack Arp Attack Mac Attack Attack Revealed Etc…
https://www.redpacketsecurity.com/evilnet-network-attack-wifi-attack-vlan-attack-arp-attack-mac-attack-attack-revealed-etc/
EvilNet – Network Attack Wifi Attack Vlan Attack Arp Attack Mac Attack Attack Revealed Etc…
https://www.redpacketsecurity.com/evilnet-network-attack-wifi-attack-vlan-attack-arp-attack-mac-attack-attack-revealed-etc/
RedPacket Security
EvilNet - Network Attack Wifi Attack Vlan Attack Arp Attack Mac Attack Attack Revealed Etc... - RedPacket Security
Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../
[papers] VLAN Hopping Attack
VLAN Hopping Attack
https://www.exploit-db.com/docs/english/45050-vlan-hopping-attack.pdf?rss
VLAN Hopping Attack
https://www.exploit-db.com/docs/english/45050-vlan-hopping-attack.pdf?rss
Forwarded from Bitácora Crackslatinos [Canal]
Curso de hacking de Radiofrecuencias de s4vitar..zip
1.6 GB
IcedID and Cobalt Strike vs Antivirus https://thedfirreport.com/2021/07/19/icedid-and-cobalt-strike-vs-antivirus/
The DFIR Report
IcedID and Cobalt Strike vs Antivirus
Intro Although IcedID was originally discovered back in 2017, it did not gain in popularity until the latter half of 2020. We have now analyzed a couple ransomware cases in 2021 (Sodinokibi & …
📌10 Best Penetration Testing Tools 2021👁
1. Metasploit
2. NMAP
3. Wireshark
4. Aircrack
5. Nessus
6. Social Engineering Toolkit
7 .W3AF
8. Burp Suite
9. BeEF
10. SQLmap
https://cybersecuritynews.com/penetration-testing-tools/
●▬۩❁ @geeekgirls ❁۩▬●
1. Metasploit
2. NMAP
3. Wireshark
4. Aircrack
5. Nessus
6. Social Engineering Toolkit
7 .W3AF
8. Burp Suite
9. BeEF
10. SQLmap
https://cybersecuritynews.com/penetration-testing-tools/
●▬۩❁ @geeekgirls ❁۩▬●
Cyber Security News
Top 30 Best Penetration Testing Tools – 2024
Best Penetration Testing Tools: 1. Wireshark 2. Metasploit 3. NMAP 4. BurpSuite 5. sqlmap 6. Intruder 7. Nessus 8. Nikto 9. BeEF 10. Invicti
WireGuard-Manager: Te permite construir tu propia #VPN en menos de un minuto 😎
https://github.com/complexorganizations/wireguard-manager?_unique_id=60f4c14e437b0
https://github.com/complexorganizations/wireguard-manager?_unique_id=60f4c14e437b0
GitHub
GitHub - complexorganizations/wireguard-manager: ✔️ wireguard-manager enables you to build your own vpn under a minute.
✔️ wireguard-manager enables you to build your own vpn under a minute. - GitHub - complexorganizations/wireguard-manager: ✔️ wireguard-manager enables you to build your own vpn under a minute.
ExploitDB Just tweeted ****************************************** [remote] Aruba Instant (IAP) - Remote Code Execution https://t.co/C0aKTDp7ib
Exploit Database
Aruba Instant (IAP) - Remote Code Execution
Aruba Instant (IAP) - Remote Code Execution. CVE-2021-25162CVE-2021-25161CVE-2021-25160CVE-2021-25159CVE-2021-25158CVE-2021-25157CVE-2021-25156CVE-2021-25155 . remote exploit for CGI platform
Facebook suspende las cuentas utilizadas por los hackers iraníes para atacar al personal militar estadounidense. https://unaaldia.hispasec.com/2021/07/facebook-suspende-las-cuentas-utilizadas-por-los-hackers-iranies-para-atacar-al-personal-militar-estadounidense.html
Una al Día
Facebook suspende las cuentas utilizadas por los hackers iraníes para atacar al personal militar estadounidense
Tenían como objetivo: militares, empresas del sector de defensa y aeroespacial de Estados Unidos, Reino Unido y Europa.