Comunidad Pen7esting
3.58K subscribers
510 photos
40 videos
142 files
5.08K links
Download Telegram
Hi.

Buen día a todos espero estén bien.

El día de hoy he publicado un nuevo script nuevamente para Samba Relay pero está ves por IPV6 espero les sea de su agrado y si hay sugerencias serán bien recibidas.

Un saludo.

https://github.com/Anonimo501/SambaRelayIpv6
Comunidad Pen7esting pinned «Hi. Buen día a todos espero estén bien. El día de hoy he publicado un nuevo script nuevamente para Samba Relay pero está ves por IPV6 espero les sea de su agrado y si hay sugerencias serán bien recibidas. Un saludo. https://github.com/Anonimo501/SambaRelayIpv6»
Cisco IOS XR Software IP Service Level Agreements and Two-Way Active Measurement Protocol Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IOS%20XR%20Software%20IP%20Service%20Level%20Agreements%20%20and%20Two-Way%20Active%20Measurement%20Protocol%20Denial%20of%20Service%20Vulnerability&vs_k=1

A vulnerability in the IP Service Level Agreements (IP SLA) responder and Two-Way Active Measurement Protocol (TWAMP) features of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause device packet memory to become exhausted or cause the IP SLA process to crash, resulting in a denial of service (DoS) condition.
This vulnerability exists because socket creation failures are mishandled during the IP SLA and TWAMP processes. An attacker could exploit this vulnerability by sending specific IP SLA or TWAMP packets to an affected device. A successful exploit could allow the attacker to exhaust the packet memory, which will impact other processes, such as routing protocols, or crash the IP SLA process.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP

This advisory is part of the September 2021 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Cisco IOS XR Software Security Advisory Bundled Publication (https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74637).




Security Impact Rating: High



CVE: CVE-2021-34720
Zero-Day crítico en MSHTML e incrustados en documentos de Microsoft Office (CVE-2021-40444)
https://blog.segu-info.com.ar/2021/09/zero-day-critico-en-mshtml-e.html
Pentesting Active Directory

https://www.xmind.net/m/5dypm8/