📃 "La NSA publica una guía sobre la protección de las comunicaciones unificadas y los sistemas de voz y video sobre IP" https://www.enhacke.com/2021/06/18/la-nsa-publica-una-guia-sobre-la-proteccion-de-las-comunicaciones-unificadas-y-los-sistemas-de-voz-y-video-sobre-ip/
📃 "Guía NSA sobre la protección de las comunicaciones unificadas y los sistemas de voz y video sobre IP" https://blog.elhacker.net/2021/06/guia-nsa-sobre-la-proteccion-de-las-comunicaciones-unificadas-sistemas-video-sobre-ip-vvoip.html
📃 "Guía NSA sobre la protección de las comunicaciones unificadas y los sistemas de voz y video sobre IP" https://blog.elhacker.net/2021/06/guia-nsa-sobre-la-proteccion-de-las-comunicaciones-unificadas-sistemas-video-sobre-ip-vvoip.html
Vulnerabilidad grave en millones de routers (AR y MX incluidos) - CVE-2021-20090
https://blog.segu-info.com.ar/2021/08/vulnerabilidad-grave-en-millones-de.html
https://blog.segu-info.com.ar/2021/08/vulnerabilidad-grave-en-millones-de.html
Segu-Info - Ciberseguridad desde 2000
Vulnerabilidad grave en millones de routers (AR y MX incluidos) - CVE-2021-20090
Decryptor para el ransomware Prometheus, Thanos y Haron
https://blog.segu-info.com.ar/2021/08/decryptor-para-el-ransomware-prometheus.html
https://blog.segu-info.com.ar/2021/08/decryptor-para-el-ransomware-prometheus.html
Segu-Info - Ciberseguridad desde 2000
Decryptor para el ransomware Prometheus, Thanos y Haron
🎙 "La triangulación mapeada" Ciencia ficción https://novadelinux.es/0x01-nvdl-la-triangulacion-mapeada/
NVDL Podcast
[0x01] NVDL - La triangulación mapeada
Recuerda que nos puedes seguir en nuestro Mastodon y te puedes unir en nuestra sala de XMPP para charlar con nosotros y compartir que os ha parecido el capitulo de hoy. También nos puedes escuchar desde FunkWhale y Archive.org o bien añadir el RSS del blog…
ReoSploit - A Tool Enumerates and Exploits Reolink Cameras
#Scanning #Network #Exploits #Reolink #Cameras
https://reconshell.com/reosploit-a-tool-enumerates-and-exploits-reolink-cameras/
#Scanning #Network #Exploits #Reolink #Cameras
https://reconshell.com/reosploit-a-tool-enumerates-and-exploits-reolink-cameras/
Penetration Testing Tools, ML and Linux Tutorials
ReoSploit - A Tool Enumerates and Exploits Reolink Cameras - Penetration Testing Tools, ML and Linux Tutorials
THIS IS FOR STRICTLY EDUCATIONAL PURPOSES, I AM NOT RESPONSIBLE FOR YOUR USE OF THIS
Un fallo crítico en el generador de números aleatorios afecta a millones de dispositivos IoT
https://unaaldia.hispasec.com/2021/08/un-fallo-critico-en-el-generador-de-numeros-aleatorios-afecta-a-millones-de-dispositivos-iot.html
https://unaaldia.hispasec.com/2021/08/un-fallo-critico-en-el-generador-de-numeros-aleatorios-afecta-a-millones-de-dispositivos-iot.html
Una al Día
Un fallo crítico en el generador de números aleatorios afecta a millones de dispositivos IoT
Todos los dispositivos IoT con un generador de números aleatorios, contienen una vulnerabilidad que afecta a la generación números aleatorios
Un traidor de la banda de Ransomware Conti filtra sus manuales técnicos https://escudodigital.com/ciberseguridad/desertor-de-la-banda-de-ransomware-conti-filtra-manuales-wizard-spider/
Escudo Digital
Un traidor de la banda de Ransomware Conti filtra sus manuales técnicos
Información actualizada sobre Seguridad y Tecnología: ciberseguridad, Defensa e Interior, empresas, tendencias, 5G, IT, IoE y compliance, entre otras.
SharpC2 - Command and Control Framework
https://reconshell.com/sharpc2-command-and-control-framework/
https://reconshell.com/sharpc2-command-and-control-framework/
Citrix Releases Security Update for ShareFile Storage Zones Controller
https://us-cert.cisa.gov/ncas/current-activity/2021/08/10/citrix-releases-security-update-sharefile-storage-zones-controller
https://us-cert.cisa.gov/ncas/current-activity/2021/08/10/citrix-releases-security-update-sharefile-storage-zones-controller
us-cert.cisa.gov
Citrix Releases Security Update for ShareFile Storage Zones Controller | CISA
Citrix has released a security update to address a vulnerability affecting Citrix ShareFile storage zones controller. An attacker can exploit this vulnerability to obtain access to sensitive information.
CISA recommends users and administrators review Citrix…
CISA recommends users and administrators review Citrix…
📃 "Stuxnet: historia del primer arma de la ciberguerra" https://www.genbeta.com/seguridad/stuxnet-historia-del-primer-arma-de-la-ciberguerra
Genbeta
Stuxnet: historia del primer arma de la ciberguerra
En 2010 salía a la luz Stuxnet, un malware que había infectado la central nuclear Natanz, en Irán. El grupo de seguridad Langner ha estado durante todo este...
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Identity%20Services%20Engine%20Stored%20Cross-Site%20Scripting%20Vulnerabilities&vs_k=1
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user.
These vulnerabilities exist because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker would need valid administrative credentials.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL
Security Impact Rating: Medium
CVE: CVE-2021-1603,CVE-2021-1604,CVE-2021-1605,CVE-2021-1606,CVE-2021-1607
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Identity%20Services%20Engine%20Stored%20Cross-Site%20Scripting%20Vulnerabilities&vs_k=1
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user.
These vulnerabilities exist because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker would need valid administrative credentials.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL
Security Impact Rating: Medium
CVE: CVE-2021-1603,CVE-2021-1604,CVE-2021-1605,CVE-2021-1606,CVE-2021-1607
Cisco
Cisco Security Advisory: Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user.
These vulnerabilities exist because…
These vulnerabilities exist because…
OTP bypass and Account takeover using response manipulation
https://infosecwriteups.com/otp-bypass-and-account-takeover-using-response-manipulation-685ad4e1ea76
https://infosecwriteups.com/otp-bypass-and-account-takeover-using-response-manipulation-685ad4e1ea76
Medium
OTP bypass and Account takeover using response manipulation
Who is Krishnadev P Melevila?
NicheStack embedded TCP/IP has vulnerabilities
Vulnerability Note VU#608209
HCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as "INFRA:HALT"
CVE IDs:
CVE-2020-25767 CVE-2020-25926 CVE-2020-25927 CVE-2020-25928 CVE-2020-35683 CVE-2020-35684 CVE-2020-35685 CVE-2021-27565 CVE-2021-31226 CVE-2021-31227 CVE-2021-31228 CVE-2021-31400 CVE-2021-31401 CVE-2021-36762
https://kb.cert.org/vuls/id/608209
Vulnerability Note VU#608209
HCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as "INFRA:HALT"
CVE IDs:
CVE-2020-25767 CVE-2020-25926 CVE-2020-25927 CVE-2020-25928 CVE-2020-35683 CVE-2020-35684 CVE-2020-35685 CVE-2021-27565 CVE-2021-31226 CVE-2021-31227 CVE-2021-31228 CVE-2021-31400 CVE-2021-31401 CVE-2021-36762
https://kb.cert.org/vuls/id/608209
www.kb.cert.org
CERT/CC Vulnerability Note VU#608209
NicheStack embedded TCP/IP has vulnerabilities
ADCSPwn - A tool to escalate privileges in active directory network
https://reconshell.com/adcspwn-a-tool-to-escalate-privileges-in-active-directory-network/
https://reconshell.com/adcspwn-a-tool-to-escalate-privileges-in-active-directory-network/
Congreso de Seguridad Informática https://www.dragonjar.org/congreso-de-seguridad-informatica.xhtml
DragonJAR - Servicios de Seguridad Informática
Congreso de Seguridad Informática - DragonJAR
Cada año, en los primeros dias del més de septiembre , se realiza sin falta el Congreso de Seguridad Informática “DragonJAR Security Conference” (DragonJARCON), un evento que muestra las técnicas modernas utilizadas por los hackers para violar sistemas de…
Microsoft confirms another Windows print spooler zero-day bug
https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-another-windows-print-spooler-zero-day-bug/
https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-another-windows-print-spooler-zero-day-bug/
BleepingComputer
Microsoft confirms another Windows print spooler zero-day bug
Microsoft has issued an advisory for another zero-day Windows print spooler vulnerability tracked as CVE-2021-36958 that allows local attackers to gain SYSTEM privileges on a computer.
Windows Print Spooler Remote Code Execution Vulnerability
Security Vulnerability
Released: Aug 11, 2021
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36958
Security Vulnerability
Released: Aug 11, 2021
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36958
La Universidad de Kentucky descubre una brecha gracias a un pentest
https://unaaldia.hispasec.com/2021/08/la-universidad-de-kentucky-descubre-una-brecha-gracias-a-un-pentest.html
https://unaaldia.hispasec.com/2021/08/la-universidad-de-kentucky-descubre-una-brecha-gracias-a-un-pentest.html
Una al Día
La Universidad de Kentucky descubre una brecha gracias a un pentest
La universidad de Kentucky anunció que había sido víctima de una fuga de datos. Dicha fuga de datos se descubrió gracias a un pentest.
Black Tool - Install the tools and start Attacking
https://reconshell.com/black-tool-install-the-tools-and-start-attacking/
https://reconshell.com/black-tool-install-the-tools-and-start-attacking/
Penetration Testing Tools, ML and Linux Tutorials
Black Tool - Install the tools and start Attacking - Penetration Testing Tools, ML and Linux Tutorials
Install the tools and start hacking Attacking !