Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
https://github.com/optiv/Registry-Recon
https://github.com/optiv/Registry-Recon
GitHub
GitHub - optiv/Registry-Recon: Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon - optiv/Registry-Recon
[webapps] COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow
COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow
https://www.exploit-db.com/exploits/50231
COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow
https://www.exploit-db.com/exploits/50231
Exploit Database
COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow
COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow.. webapps exploit for Hardware platform
Snakeoil: 1
https://www.vulnhub.com/entry/snakeoil_1,738/
Recently, Good Tech Inc. has decided to change their application development process. However, their applications look broken and too basic. Is this an application full of snakeoil, or are they insecure too? This goes beyond PEN-200, and some web application development expertise could be helpful.
If you MUST have hints for this machine: SNAKEOIL is (#1): a hint by itself, (#2): full of disallowed methods, (#3): a single file full of problems.
VulnHub (https://www.vulnhub.com/)
https://www.vulnhub.com/entry/snakeoil_1,738/
Recently, Good Tech Inc. has decided to change their application development process. However, their applications look broken and too basic. Is this an application full of snakeoil, or are they insecure too? This goes beyond PEN-200, and some web application development expertise could be helpful.
If you MUST have hints for this machine: SNAKEOIL is (#1): a hint by itself, (#2): full of disallowed methods, (#3): a single file full of problems.
VulnHub (https://www.vulnhub.com/)
Vulnhub
digitalworld.local: snakeoil
digitalworld.local: snakeoil, made by Donavan. Download & walkthrough links are available.
#exploit
CVE 2021-36394:
Moodle RCE risk when Shibboleth authentication is enabled (PoC)
https://github.com/dinhbaouit/CVE-2021-36394
]-> https://0xd0ff9.wordpress.com/2021/08/28/cve-2021-36394-hack-truong-sua-diem-cac-kieu
CVE 2021-36394:
Moodle RCE risk when Shibboleth authentication is enabled (PoC)
https://github.com/dinhbaouit/CVE-2021-36394
]-> https://0xd0ff9.wordpress.com/2021/08/28/cve-2021-36394-hack-truong-sua-diem-cac-kieu
GitHub
GitHub - dinhbaouit/CVE-2021-36394
Contribute to dinhbaouit/CVE-2021-36394 development by creating an account on GitHub.
Cómo proteger el borrado accidental de archivos en Linux | Linux Adictos
https://www.linuxadictos.com/como-proteger-el-borrado-accidental-de-archivos-en-linux.html
https://www.linuxadictos.com/como-proteger-el-borrado-accidental-de-archivos-en-linux.html
Linux Adictos
Cómo proteger el borrado accidental de archivos en Linux
Pequeño tutorial sobre cómo proteger nuestros archivos y hacer que el borrado accidental de nuestros archivos en nuestro Gnu/Linux sea algo difícil de hacer
Vulnerabilidades PrintNightmare, ProxyShell y PetitPotam aprovechadas por el ransomware
https://blog.segu-info.com.ar/2021/08/vulnerabilidades-printnightmare.html
https://blog.segu-info.com.ar/2021/08/vulnerabilidades-printnightmare.html
Segu-Info - Ciberseguridad desde 2000
Vulnerabilidades PrintNightmare, ProxyShell y PetitPotam aprovechadas por el ransomware
Attacktive Directory: TryHackMe Walkthrough-Part 2 https://infosecwriteups.com/attacktive-directory-tryhackme-walkthrough-part-2-3ab8f4d4a9bf?source=rss----7b722bfd1b8d---4
Medium
Attacktive Directory: TryHackMe Walkthrough-Part 2
Hello guys, I am Sudeepa Shiranthaka. Today, we are going to complete the final tasks of the Attacktive Directory room on TryHackMe. If you…
ExploitDB Just tweeted ****************************************** [webapps] Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated) https://t.co/ahvLuHrssz
Exploit Database
Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated)
Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated).. webapps exploit for Multiple platform
[webapps] Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated)
Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50238
Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50238
Exploit Database
Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated)
Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated). CVE-2019-19609 . webapps exploit for Multiple platform
📃 "Así funciona la VPN gratis de Opera" https://hipertextual.com/2021/07/vpn-gratis-opera
Pero si quieres una VPN segura de verdad y con múltiples opciones: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=45752&url_id=11987
Pero si quieres una VPN segura de verdad y con múltiples opciones: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=45752&url_id=11987
Hipertextual
Así funciona la VPN gratis de Opera
Opera es uno de los navegadores más innovadores. Entre sus particularidades, cuenta con una VPN gratis propia para que navegues más seguro.