Comunidad Pen7esting
3.59K subscribers
511 photos
40 videos
142 files
5.09K links
Download Telegram
Cisco Aironet Access Points WLAN Control Protocol Packet Buffer Leak Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Aironet%20Access%20Points%20WLAN%20Control%20Protocol%20Packet%20Buffer%20Leak%20Denial%20of%20Service%20Vulnerability&vs_k=1

A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. 
This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL



Security Impact Rating: High



CVE: CVE-2021-34740
Cisco SD-WAN Software Command Injection Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-cmdinjec-znUYTuC?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20SD-WAN%20Software%20Command%20Injection%20Vulnerability&vs_k=1

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system of an affected device.
This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-cmdinjec-znUYTuC



Security Impact Rating: Medium



CVE: CVE-2021-34726
Forwarded from Bitácora Crackslatinos [Canal]
Udemy_Escuela_Hacker!_Hacking_Wifi_desde_cero_Técnicas_de_Ataque.rar
192.3 MB
Forwarded from Bitácora Crackslatinos [Canal]
Escuela Hacker! Hacking Wifi desde cero

El Curso está enfocado para preparar a los alumnos a realizar test de penetración en su propia red wifi (inalámbrica) y lo mejor de todo es que todo está explicado paso a paso.

Todo el curso permitirá conocer el amplio grado de vulnerabilidades que pueden existir en las redes que se encuentran ofreciendo diversos servicios. El material incluye Videos donde se explica toda la parte práctica y técnica que se necesitan en este ambiente de trabajo y cada configuración y ejemplo es realizado en vivo.
#OSCP

Preparación para la certificación OSCP

Esta página web contiene recursos online para la certificación, aparte de recomendaciones de parte de alguien que realizó la titulación.

Dentro podremos encontrar una amplia lista de máquinas para practicar y prepararnos mejor.

Recurso:
https://t.co/sPDbLxLHiX?amp=1

Más información sobre OSCP:
https://opendatasecurity.io/certificacion-oscp/