Comunidad Pen7esting
3.62K subscribers
513 photos
40 videos
142 files
5.09K links
Download Telegram
Forwarded from Bitácora Crackslatinos [Canal]
Creacion de Exploits desde Cero

Un exploit es cualquier ataque que aprovecha las vulnerabilidades de las aplicaciones, las redes, los sistemas operativos o el hardware. Por lo general, los exploits toman la forma de un programa de software o una secuencia de código previsto para hacerse con el control de los ordenadores o robar datos de red.
Forwarded from Bitácora Crackslatinos [Canal]
Creacion de Exploits Desde 0.zip
10.9 MB
🛡▶️ Un ciberataque ruso retrasa el pago a dos millones de parados en España

Una intrusión en los sistemas del SEPE ha bloqueado los ficheros que se envían a los bancos para el abono de las nóminas. El CNI envió una alerta hace un mes y el incidente ha provocado el retraso en el pago del paro de marzo.

https://www.elconfidencialdigital.com/articulo/politica/confirmados-temores-gobierno-ciberataque-ruso-retrasa-pago-millones-parados/20220406172552377670.html
Metasploitable v3, un entorno para aprender hacking ético
https://blog.segu-info.com.ar/2022/04/metasploitable-v3-un-entorno-para.html
Cisco Web Security Appliance Filter Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Web%20Security%20Appliance%20Filter%20Bypass%20Vulnerability&vs_k=1

A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device.
This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X



Security Impact Rating: Medium



CVE: CVE-2022-20784
VMSA-2022-0010.4

CVSSv3 Range: 9.8
Issue Date: 2022-04-02

Updated On: 2022-04-08
CVE(s): CVE-2022-22965

Synopsis:
VMware Response to Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965)

Impacted Products
VMware Tanzu Application Service for VMs (TAS)
VMware Tanzu Operations Manager (Ops Manager)
VMware Tanzu Kubernetes Grid Integrated Edition (TKGI)

https://www.vmware.com/security/advisories/VMSA-2022-0010.html