RomBuster - router exploitation tool
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
How to Check Open Ports in Your Linux System
https://reconshell.com/how-to-check-open-ports-in-your-linux-system/
https://reconshell.com/how-to-check-open-ports-in-your-linux-system/
Penetration Testing Tools, ML and Linux Tutorials
How to Check Open Ports in Your Linux System - Penetration Testing Tools, ML and Linux Tutorials
As a Linux system administrator, to transmit data from server to server having a good command over the TCP (Transmission Control Protocol) protocols is very
El gobierno de Chile ha puesto urgencia a la discusión del TPP en el Senado. Su aprobación significará mayores restricciones y persecución en la actividad digital y en el intercambio de contenidos. Más información ⬇️
https://colectivodisonancia.net/2021/01/no-al-tpp/
Infografía TPP: https://colectivodisonancia.net/no-al-tpp-info/
https://colectivodisonancia.net/2021/01/no-al-tpp/
Infografía TPP: https://colectivodisonancia.net/no-al-tpp-info/
Colectivo Disonancia
No al TPP
El TPP11 es un tratado económico y político que amenaza la autonomía de las comunicaciones y la capacidad de organizarnos en red.
KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS)
https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
📃 "Escalada de privilegios en Linux con polkit" https://unaaldia.hispasec.com/2021/06/escalada-de-privilegios-en-linux-con-polkit.html
Una al Día
Escalada de privilegios en Linux con polkit
Un reciente artículo detalla el procedimiento que permite realizar una escalada de privilegios en sistemas Linux que utilizan el servicio polkit.
Gracias a todos los nuevos integrantes del grupo, por estar aquí y a los que siempre han estado desde el comienzo, un saludo y no olviden compartir el canal para que podamos seguir creciendo muchas gracias a todos.
Canal en telegram
⚔🛡☣ Comunidad Anonimo501 💻📱🖥
https://t.me/Pen7esting
Canal de Youtube
https://youtube.com/c/Anonimo501
Github
https://github.com/Anonimo501
Canal en telegram
⚔🛡☣ Comunidad Anonimo501 💻📱🖥
https://t.me/Pen7esting
Canal de Youtube
https://youtube.com/c/Anonimo501
Github
https://github.com/Anonimo501
Telegram
Comunidad Pen7esting
@Anonimo501
[webapps] Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
https://www.exploit-db.com/exploits/50158
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
https://www.exploit-db.com/exploits/50158
Exploit Database
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass.. webapps exploit for PHP platform
Principios de diseños de Arquitecturas Zero Trust
https://blog.segu-info.com.ar/2021/07/principios-de-disenos-de-arquitecturas.html
https://blog.segu-info.com.ar/2021/07/principios-de-disenos-de-arquitecturas.html
Segu-Info - Ciberseguridad desde 2000
Principios de diseños de Arquitecturas Zero Trust
CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
Investigadores logran ocultar malware en una red neuronal
https://blog.segu-info.com.ar/2021/07/investigadores-logran-ocultar-malware.html
https://blog.segu-info.com.ar/2021/07/investigadores-logran-ocultar-malware.html
Segu-Info - Ciberseguridad desde 2000
Investigadores logran ocultar malware en una red neuronal
ExploitDB Just tweeted ****************************************** [webapps] Event Registration System with QR Code 1.0 - Authentication Bypass & RCE https://t.co/NLZlt7wwlT
Exploit Database
Event Registration System with QR Code 1.0 - Authentication Bypass & RCE
Event Registration System with QR Code 1.0 - Authentication Bypass & RCE.. webapps exploit for PHP platform
ExploitDB Just tweeted ****************************************** [webapps] CloverDX 5.9.0 - Cross-Site Request Forgery (CSRF) to Remote Code Execution (RCE) https://t.co/5ZHjl3krWx
Exploit Database
CloverDX 5.9.0 - Cross-Site Request Forgery (CSRF) to Remote Code Execution (RCE)
CloverDX 5.9.0 - Cross-Site Request Forgery (CSRF) to Remote Code Execution (RCE). CVE-2021-29995 . webapps exploit for Java platform
ExploitDB Just tweeted ****************************************** [webapps] Oracle Fatwire 6.3 - Multiple Vulnerabilities https://t.co/nu7VClpBS9
Exploit Database
Oracle Fatwire 6.3 - Multiple Vulnerabilities
Oracle Fatwire 6.3 - Multiple Vulnerabilities.. webapps exploit for Multiple platform
📃 "Historia del Ransomware Ruyk: el más prolífico atacando hospitales" https://blog.elhacker.net/2021/06/historia-del-ransomware-ruyk-el-mas-prolifico-atacando-hospitales-y-spain.html
¿Os acordáis del SEPE? https://t.me/seguridadinformatic4/2450 | https://t.me/seguridadinformatic4/2463
¿Os acordáis del SEPE? https://t.me/seguridadinformatic4/2450 | https://t.me/seguridadinformatic4/2463
Blog elhacker.NET
Historia del Ransomware Ruyk: el más prolífico atacando hospitales
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
Critical flaw in Microsoft Hyper-V could allow RCE and DoS
Experts disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow executing arbitrary code on it.
Researchers Peleg Hadar of SafeBreach and Ophir Harpaz of Guardicore disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow triggering a DoS condition ot executing arbitrary code on it.
https://securityaffairs.co/wordpress/120654/hacking/critical-microsoft-hyper-v-bug.html
Experts disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow executing arbitrary code on it.
Researchers Peleg Hadar of SafeBreach and Ophir Harpaz of Guardicore disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow triggering a DoS condition ot executing arbitrary code on it.
https://securityaffairs.co/wordpress/120654/hacking/critical-microsoft-hyper-v-bug.html
Security Affairs
Critical flaw in Microsoft Hyper-V could allow RCE and DoS
Experts disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow executing arbitrary code on it.