Comunidad Pen7esting
3.59K subscribers
511 photos
40 videos
142 files
5.09K links
Download Telegram
Buenas tardes familia.

Se ha considerado NO combinar este grupo de hacking con temas NFT, por lo que he creado un grupo específico para este tema, el link se los dejo por aquí:

https://t.me/NFT_Next
*Nuevos cursos en el servidor de torrent!*

Curso de ciberseguridad enfocada en Pentesting
Curso completo de Hacking Ético
Curso completo de inteligencia artificial con Python
Curso completo de Hacking
Curso de Codeigniter 3
Curso de SEO y Posicionamiento en Google
Curso Hacking Comunix
Curso JS Node Mongo
Curso Laravel
Curso Maestro de Python

El link para ver todos los cursos es este: https://docs.google.com/spreadsheets/d/1un-Jo4EVRuHfT5yEM3H2yHTCgZjVh2IR3s9C1E5iDT8/edit#gid=0

En caso de no saber como se descargan: https://underc0de.org/foro/almacen-de-manuales/guia-para-descarga-de-archivos-de-enlace-magnetico-torrent/
Comunidad Pen7esting pinned «Buenas tardes familia. Se ha considerado NO combinar este grupo de hacking con temas NFT, por lo que he creado un grupo específico para este tema, el link se los dejo por aquí: https://t.me/NFT_Next»
Próximamente, nuevo canal de Youtube NFT
Multiple Cisco Products Snort Modbus Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Multiple%20Cisco%20Products%20Snort%20Modbus%20Denial%20of%20Service%20Vulnerability&vs_k=1

A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj



Security Impact Rating: High



CVE: CVE-2022-20685