XCSSET, el malware de MacOS vuelve con novedades
https://unaaldia.hispasec.com/2021/07/xcsset-el-malware-de-macos-vuelve-con-novedades.html
https://unaaldia.hispasec.com/2021/07/xcsset-el-malware-de-macos-vuelve-con-novedades.html
Una al Día
XCSSET, el malware de MacOS vuelve con novedades
Un malware cuyo principal objetivo es el sistema operativo MacOS ha vuelto con una actualización que le dota de más funcionalidades.
# CVE-2017-9841. The exploit targets Drupal sites that currently or
previously used the Mailchimp or Mailchimp commerce module and still have a
vulnerable version of the file
sites/all/libraries/mailchimp/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php.
See below for details on whether a file is vulnerable or not. The vulnerable
file might be at other paths on your individual site, but an automated attack
exists that is looking for that specific path. This attack can execute PHP on
the server
previously used the Mailchimp or Mailchimp commerce module and still have a
vulnerable version of the file
sites/all/libraries/mailchimp/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php.
See below for details on whether a file is vulnerable or not. The vulnerable
file might be at other paths on your individual site, but an automated attack
exists that is looking for that specific path. This attack can execute PHP on
the server
Nuevo video! Esta vez de la máquina Anonymous, de la plataforma THM, cualquier feedback es de mucha ayuda gracias!
https://www.youtube.com/watch?v=GH2FFIGd-y4
https://www.youtube.com/watch?v=GH2FFIGd-y4
RomBuster - router exploitation tool
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
How to Check Open Ports in Your Linux System
https://reconshell.com/how-to-check-open-ports-in-your-linux-system/
https://reconshell.com/how-to-check-open-ports-in-your-linux-system/
Penetration Testing Tools, ML and Linux Tutorials
How to Check Open Ports in Your Linux System - Penetration Testing Tools, ML and Linux Tutorials
As a Linux system administrator, to transmit data from server to server having a good command over the TCP (Transmission Control Protocol) protocols is very
El gobierno de Chile ha puesto urgencia a la discusión del TPP en el Senado. Su aprobación significará mayores restricciones y persecución en la actividad digital y en el intercambio de contenidos. Más información ⬇️
https://colectivodisonancia.net/2021/01/no-al-tpp/
Infografía TPP: https://colectivodisonancia.net/no-al-tpp-info/
https://colectivodisonancia.net/2021/01/no-al-tpp/
Infografía TPP: https://colectivodisonancia.net/no-al-tpp-info/
Colectivo Disonancia
No al TPP
El TPP11 es un tratado económico y político que amenaza la autonomía de las comunicaciones y la capacidad de organizarnos en red.
KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS)
https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
📃 "Escalada de privilegios en Linux con polkit" https://unaaldia.hispasec.com/2021/06/escalada-de-privilegios-en-linux-con-polkit.html
Una al Día
Escalada de privilegios en Linux con polkit
Un reciente artículo detalla el procedimiento que permite realizar una escalada de privilegios en sistemas Linux que utilizan el servicio polkit.
Gracias a todos los nuevos integrantes del grupo, por estar aquí y a los que siempre han estado desde el comienzo, un saludo y no olviden compartir el canal para que podamos seguir creciendo muchas gracias a todos.
Canal en telegram
⚔🛡☣ Comunidad Anonimo501 💻📱🖥
https://t.me/Pen7esting
Canal de Youtube
https://youtube.com/c/Anonimo501
Github
https://github.com/Anonimo501
Canal en telegram
⚔🛡☣ Comunidad Anonimo501 💻📱🖥
https://t.me/Pen7esting
Canal de Youtube
https://youtube.com/c/Anonimo501
Github
https://github.com/Anonimo501
Telegram
Comunidad Pen7esting
@Anonimo501
[webapps] Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
https://www.exploit-db.com/exploits/50158
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
https://www.exploit-db.com/exploits/50158
Exploit Database
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass.. webapps exploit for PHP platform
Principios de diseños de Arquitecturas Zero Trust
https://blog.segu-info.com.ar/2021/07/principios-de-disenos-de-arquitecturas.html
https://blog.segu-info.com.ar/2021/07/principios-de-disenos-de-arquitecturas.html
Segu-Info - Ciberseguridad desde 2000
Principios de diseños de Arquitecturas Zero Trust
CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
Investigadores logran ocultar malware en una red neuronal
https://blog.segu-info.com.ar/2021/07/investigadores-logran-ocultar-malware.html
https://blog.segu-info.com.ar/2021/07/investigadores-logran-ocultar-malware.html
Segu-Info - Ciberseguridad desde 2000
Investigadores logran ocultar malware en una red neuronal
ExploitDB Just tweeted ****************************************** [webapps] Event Registration System with QR Code 1.0 - Authentication Bypass & RCE https://t.co/NLZlt7wwlT
Exploit Database
Event Registration System with QR Code 1.0 - Authentication Bypass & RCE
Event Registration System with QR Code 1.0 - Authentication Bypass & RCE.. webapps exploit for PHP platform
ExploitDB Just tweeted ****************************************** [webapps] CloverDX 5.9.0 - Cross-Site Request Forgery (CSRF) to Remote Code Execution (RCE) https://t.co/5ZHjl3krWx
Exploit Database
CloverDX 5.9.0 - Cross-Site Request Forgery (CSRF) to Remote Code Execution (RCE)
CloverDX 5.9.0 - Cross-Site Request Forgery (CSRF) to Remote Code Execution (RCE). CVE-2021-29995 . webapps exploit for Java platform
ExploitDB Just tweeted ****************************************** [webapps] Oracle Fatwire 6.3 - Multiple Vulnerabilities https://t.co/nu7VClpBS9
Exploit Database
Oracle Fatwire 6.3 - Multiple Vulnerabilities
Oracle Fatwire 6.3 - Multiple Vulnerabilities.. webapps exploit for Multiple platform