Zero-Day en FortiClient permite robo de credenciales de VPN
https://blog.segu-info.com.ar/2024/11/zero-day-en-forticlient-permite-robo-de.html
https://blog.segu-info.com.ar/2024/11/zero-day-en-forticlient-permite-robo-de.html
👍1
📌 #OCSP Official Documentation
🔗https://offensive-security.com/offsec/oscp-exam-structure/
🔗https://offensive-security.com/metasploit-unleashed/
🔗https://help.offensive-security.com/hc/en-us
🔗https://help.offensive-security.com/hc/en-us/articles/360050473812
🔗https://offensive-security.com/documentation/penetration-testing-with-kali.pdf
🔗https://forums.offensive-security.com
📌 OCSP Tools and Resources
🔗https://falconspy.medium.com/unofficial-oscp-approved-tools-b2b4e889e707
🔗https://reddit.com/r/oscp/comments/if1q5v/ive_made_a_list_of_reddit_topics_that_you_should/
🔗https://github.com/Tib3rius/AutoRecon
🔗https://hackingarticles.in/comprehensive-guide-to-autorecon/
🔗https://github.com/21y4d/nmapAutomator
🔗https://github.com/codingo/Reconnoitre
📌OSCP Guides
🔗https://johnstawinski.com/2022/10/09/oscp-2023-study-guide-new-exam-format
🔗https://johnjhacking.com/blog/oscp-reborn-2023/
🔗https://sgtdede.gitbook.io/hacking/oscp-2022/guide-en
🔗https://netsecfocus.com/oscp/2021/05/06/The_Journey_to_Try_Harder-_TJnull-s_Preparation_Guide_for_PEN-200_PWK_OSCP_2.0.html
🔗https://hxrrvs.gitbook.io/oscp/
🔗https://ninjasec.medium.com/efficiently-utilizing-autorecon-for-oscp-and-beyond-74c93a273a36
🔗https://github.com/Shiva108/CTF-notes/tree/master/OSCP-Materials-master
🔗https://github.com/Shiva108/CTF-notes/tree/master/Notes%20VA
🔗https://github.com/Shiva108/CTF-notes/tree/master/Everything-OSCP
🔗https://github.com/Shiva108/CTF-notes/blob/master/enum_oscp.html
🔗https://github.com/Shiva108/CTF-notes/blob/master/how-to-oscp-final.md
🔗https://github.com/Shiva108/CTF-notes/blob/master/Kali%20Linux%20Offensive%20Security%20Certified%20Professional%20Playbook.html
🔗https://avasdream.engineer/assets/OSCP-Methodology.png
🔗https://kali.training/lessons/introduction/
🔗https://netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html
🔗https://tripwire.com/state-of-security/security-awareness/oscp-journey/
🔗https://411hall.github.io/OSCP-Preparation/
🔗https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
🔗https://abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
🔗https://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/
🔗https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/
🔗https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440
🔗https://sushant747.gitbooks.io/total-oscp-guide/content/
🔗https://rana-khalil.gitbook.io/hack-the-box-oscp-preparation/my-oscp-journey-a-review
📌 OCSP Essential Videos and Courses
🔗TryHackMe Pentesting Course -https://tryhackme.com/path/outline/pentesting
🔗TryHackMe Buffer Overflow Prep -https://tryhackme.com/room/bufferoverflowprep
🔗Cyber Mentor: Buffer overflow - https://tcm-sec.com/buffer-overflows-made-easy/
🔗Tiberius' Priv Esc Courses - https://udemy.com/course/linux-privilege-escalation/
🔗TJNull's OSCP Prep - https://youtube.com/playlist?list=PLidcsTyj9JXK-fnabFLVEvHinQ14Jy5tf
🔗Tiberius Buffer overflow - https://youtube.com/watch?v=1X2JGF_9JGM
🔗Conda's OSCP Prep - https://youtube.com/playlist?list=PLDrNMcTNhhYqZU1ySROli7Oc08mxe1tZR
📌 OCSP Practice Box List
🔗TJNull's List - https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=1839402159
🔗HackTheBox List -https://docs.google.com/spreadsheets/d/1PVH3athOru-rHirsy30R1r8692R6J44W7uuHTrquqnk/edit#gid=1638926857https://hyd3.home.blog/2020/06/22/oscp-prep-hackthebox-list/
🔗NoobSec List - https://docs.google.com/spreadsheets/d/1PVH3athOru-rHirsy30R1r8692R6J44W7uuHTrquqnk/edit#gid=1638926857
🔗OSCP-like Boxes -https://nopresearcher.github.io/OSCP-Like-Boxes/
Referencias en Twitter: @s0cm0nkeysec @harshleenchawl2
🔗https://offensive-security.com/offsec/oscp-exam-structure/
🔗https://offensive-security.com/metasploit-unleashed/
🔗https://help.offensive-security.com/hc/en-us
🔗https://help.offensive-security.com/hc/en-us/articles/360050473812
🔗https://offensive-security.com/documentation/penetration-testing-with-kali.pdf
🔗https://forums.offensive-security.com
📌 OCSP Tools and Resources
🔗https://falconspy.medium.com/unofficial-oscp-approved-tools-b2b4e889e707
🔗https://reddit.com/r/oscp/comments/if1q5v/ive_made_a_list_of_reddit_topics_that_you_should/
🔗https://github.com/Tib3rius/AutoRecon
🔗https://hackingarticles.in/comprehensive-guide-to-autorecon/
🔗https://github.com/21y4d/nmapAutomator
🔗https://github.com/codingo/Reconnoitre
📌OSCP Guides
🔗https://johnstawinski.com/2022/10/09/oscp-2023-study-guide-new-exam-format
🔗https://johnjhacking.com/blog/oscp-reborn-2023/
🔗https://sgtdede.gitbook.io/hacking/oscp-2022/guide-en
🔗https://netsecfocus.com/oscp/2021/05/06/The_Journey_to_Try_Harder-_TJnull-s_Preparation_Guide_for_PEN-200_PWK_OSCP_2.0.html
🔗https://hxrrvs.gitbook.io/oscp/
🔗https://ninjasec.medium.com/efficiently-utilizing-autorecon-for-oscp-and-beyond-74c93a273a36
🔗https://github.com/Shiva108/CTF-notes/tree/master/OSCP-Materials-master
🔗https://github.com/Shiva108/CTF-notes/tree/master/Notes%20VA
🔗https://github.com/Shiva108/CTF-notes/tree/master/Everything-OSCP
🔗https://github.com/Shiva108/CTF-notes/blob/master/enum_oscp.html
🔗https://github.com/Shiva108/CTF-notes/blob/master/how-to-oscp-final.md
🔗https://github.com/Shiva108/CTF-notes/blob/master/Kali%20Linux%20Offensive%20Security%20Certified%20Professional%20Playbook.html
🔗https://avasdream.engineer/assets/OSCP-Methodology.png
🔗https://kali.training/lessons/introduction/
🔗https://netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html
🔗https://tripwire.com/state-of-security/security-awareness/oscp-journey/
🔗https://411hall.github.io/OSCP-Preparation/
🔗https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
🔗https://abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
🔗https://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/
🔗https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/
🔗https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440
🔗https://sushant747.gitbooks.io/total-oscp-guide/content/
🔗https://rana-khalil.gitbook.io/hack-the-box-oscp-preparation/my-oscp-journey-a-review
📌 OCSP Essential Videos and Courses
🔗TryHackMe Pentesting Course -https://tryhackme.com/path/outline/pentesting
🔗TryHackMe Buffer Overflow Prep -https://tryhackme.com/room/bufferoverflowprep
🔗Cyber Mentor: Buffer overflow - https://tcm-sec.com/buffer-overflows-made-easy/
🔗Tiberius' Priv Esc Courses - https://udemy.com/course/linux-privilege-escalation/
🔗TJNull's OSCP Prep - https://youtube.com/playlist?list=PLidcsTyj9JXK-fnabFLVEvHinQ14Jy5tf
🔗Tiberius Buffer overflow - https://youtube.com/watch?v=1X2JGF_9JGM
🔗Conda's OSCP Prep - https://youtube.com/playlist?list=PLDrNMcTNhhYqZU1ySROli7Oc08mxe1tZR
📌 OCSP Practice Box List
🔗TJNull's List - https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=1839402159
🔗HackTheBox List -https://docs.google.com/spreadsheets/d/1PVH3athOru-rHirsy30R1r8692R6J44W7uuHTrquqnk/edit#gid=1638926857https://hyd3.home.blog/2020/06/22/oscp-prep-hackthebox-list/
🔗NoobSec List - https://docs.google.com/spreadsheets/d/1PVH3athOru-rHirsy30R1r8692R6J44W7uuHTrquqnk/edit#gid=1638926857
🔗OSCP-like Boxes -https://nopresearcher.github.io/OSCP-Like-Boxes/
Referencias en Twitter: @s0cm0nkeysec @harshleenchawl2
OffSec
OSCP Exam Change | Offensive Security
We are going to change the OSCP exam structure to better reflect the PWK materials and the skills needed to be a more well-rounded Penetration Tester.
👍7❤2
Vuelve a aparecer otro sitio FALSO (.org) de ARCA (ex AFIP) con una aplicación móvil APK.
https://x.com/SeguInfo/status/1858886643970707611
https://x.com/SeguInfo/status/1858886643970707611
🔥3👍1
Correos electrónicos de phishing utilizan cada vez más archivos adjuntos SVG para evadir la detección
https://blog.segu-info.com.ar/2024/11/correos-electronicos-de-phishing.html
https://blog.segu-info.com.ar/2024/11/correos-electronicos-de-phishing.html
❤1🔥1👏1
Aquí Elonmuss te enseña a hacerte millonario!
https://x.com/SeguInfo/status/1859024598530138143
https://x.com/SeguInfo/status/1859024598530138143
😁6🤯3🔥1
Apple corrige dos vulnerabilidades Zero-Days
https://blog.segu-info.com.ar/2024/11/apple-corrige-dos-vulnerabilidades-zero.html
https://blog.segu-info.com.ar/2024/11/apple-corrige-dos-vulnerabilidades-zero.html
🔥1
Sabotaje en el Báltico: cables de datos cortados entre Finlandia y Alemania
https://blog.segu-info.com.ar/2024/11/sabotaje-en-el-baltico-cables-de-datos.html
https://blog.segu-info.com.ar/2024/11/sabotaje-en-el-baltico-cables-de-datos.html
🔥7
Recuerden que hace un par de años publicamos de forma gratuita el curso de la #Certificación #CISSP completo
🔗https://www.youtube.com/seguinfo
🔗https://www.youtube.com/seguinfo
YouTube
Segu-Info - Seguridad de la Información
Canal de videos del sitio Segu-Info - Ciberseguridad desde el 2000
👏14❤6👍4
MITRE publica las 25 debilidades de software más peligrosas de 2024 (CWE)
https://blog.segu-info.com.ar/2024/11/mitre-publica-las-25-debilidades-de.html
https://blog.segu-info.com.ar/2024/11/mitre-publica-las-25-debilidades-de.html
👍4
Firewalls Palo Alto comprometidos por vulnerabilidad Zero-Day
https://blog.segu-info.com.ar/2024/11/firewalls-palo-alto-comprometidos-por.html
https://blog.segu-info.com.ar/2024/11/firewalls-palo-alto-comprometidos-por.html
👍1👏1
#Libros de Hacking... Sí tomá!
Nunca hay excusa para no estudiar.
🔗 https://github.com/InspectorDidi/Hacking-Books
Nunca hay excusa para no estudiar.
GitHub
GitHub - InspectorDidi/Hacking-Books: Hacking Books
Hacking Books. Contribute to InspectorDidi/Hacking-Books development by creating an account on GitHub.
🔥7👍3😁1
This media is not supported in your browser
VIEW IN TELEGRAM
Más info sobre #Quishing porque hay mucho humo. El cartel es el mismo, el QR es distinto.
El QR solo *no* hace nada!
Al escanearlo brinda un enlace. Si ingresas, lo que suceDÍA se vé en📽 (solo si entras).
El comportamiento puede cambiar de acuerdo al enlace que te toque.
🔗https://x.com/SeguInfo/status/1859740307241435575
El QR solo *no* hace nada!
Al escanearlo brinda un enlace. Si ingresas, lo que suceDÍA se vé en📽 (solo si entras).
El comportamiento puede cambiar de acuerdo al enlace que te toque.
🔗https://x.com/SeguInfo/status/1859740307241435575
👍11👏1
Forwarded from Alfonso Muñoz
Por si le interesa a alguien - https://x.com/mindcrypt/status/1859922146304413864
👍2
Fallo en el diseño de la VPN de Fortinet oculta ataques de fuerza bruta exitosos
https://blog.segu-info.com.ar/2024/11/fallo-en-el-diseno-de-la-vpn-de.html
https://blog.segu-info.com.ar/2024/11/fallo-en-el-diseno-de-la-vpn-de.html
🤬4🔥1
Cross-site Scripting (XSS) es la debilidad más común de 2024 (¿NO TE DA VERGÜENZA?)
https://blog.segu-info.com.ar/2024/11/cross-site-scripting-xss-es-la.html
https://blog.segu-info.com.ar/2024/11/cross-site-scripting-xss-es-la.html
👍2👎1
Si estas por Paraná o la zona, venite (24, 25 y 26/11).
🔗https://linktr.ee/conertech
Desde la Laboratorio de Seguridad (LASI) de la Univ. Autónoma de Entre Ríos vamos a presentar las investigaciones realizadas este año!
Sí, también hablaremos de inseguridad en IA.
🔗https://linktr.ee/conertech
Desde la Laboratorio de Seguridad (LASI) de la Univ. Autónoma de Entre Ríos vamos a presentar las investigaciones realizadas este año!
Sí, también hablaremos de inseguridad en IA.
Linktree
conertech | Instagram, Facebook, Twitch | Linktree
Linktree. Make your link do more.
👍8❤6
SMS Blasters, los problemas de las redes 2G y el #SMiShing
https://blog.segu-info.com.ar/2024/11/sms-blasters-los-problemas-de-las-redes.html
https://blog.segu-info.com.ar/2024/11/sms-blasters-los-problemas-de-las-redes.html
👍4🔥1
Vulnerabilidad grave en Winzip
https://blog.segu-info.com.ar/2024/11/vulnerabilidad-grave-en-winzip.html
https://blog.segu-info.com.ar/2024/11/vulnerabilidad-grave-en-winzip.html
🔥9