Forwarded from DailyCVE
🔵 LXD PKI Mode Vulnerability (Low Impact)
https://dailycve.com/lxd-pki-mode-vulnerability-low-impact/
@Daily_CVE
https://dailycve.com/lxd-pki-mode-vulnerability-low-impact/
@Daily_CVE
DailyCVE
LXD PKI Mode Vulnerability (Low Impact) - DailyCVE
2024-12-10 Vulnerability details: Platform: LXD Vulnerability: Improper Certificate Restriction Handling in PKI Mode CVE: N/A (Not assigned) Severity: Low Date: […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📊 50,000 Miles with the #Tesla Cybertruck: Real-World Insights from a Dedicated Owner
https://undercodenews.com/50000-miles-with-the-tesla-cybertruck-real-world-insights-from-a-dedicated-owner/
@Undercode_News
https://undercodenews.com/50000-miles-with-the-tesla-cybertruck-real-world-insights-from-a-dedicated-owner/
@Undercode_News
UNDERCODE NEWS
50,000 Miles with the Tesla Cybertruck: Real-World Insights from a Dedicated Owner - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔐 #Ransomware Attack Disrupts Artivion's Operations
https://undercodenews.com/ransomware-attack-disrupts-artivions-operations/
@Undercode_News
https://undercodenews.com/ransomware-attack-disrupts-artivions-operations/
@Undercode_News
UNDERCODE NEWS
Ransomware Attack Disrupts Artivion's Operations - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ A New Data Center and Clean Energy Synergy
https://undercodenews.com/a-new-data-center-and-clean-energy-synergy/
@Undercode_News
https://undercodenews.com/a-new-data-center-and-clean-energy-synergy/
@Undercode_News
UNDERCODE NEWS
A New Data Center and Clean Energy Synergy - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
TestFlight Gets a Dark Mode Makeover
https://undercodenews.com/testflight-gets-a-dark-mode-makeover/
@Undercode_News
https://undercodenews.com/testflight-gets-a-dark-mode-makeover/
@Undercode_News
UNDERCODE NEWS
TestFlight Gets a Dark Mode Makeover - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from DailyCVE
🔵 LXD PKI Mode Vulnerability Allows Unauthorized Authentication with Non-CA Signed Certificates
https://dailycve.com/lxd-pki-mode-vulnerability-allows-unauthorized-authentication-with-non-ca-signed-certificates/
@Daily_CVE
https://dailycve.com/lxd-pki-mode-vulnerability-allows-unauthorized-authentication-with-non-ca-signed-certificates/
@Daily_CVE
DailyCVE
LXD PKI Mode Vulnerability Allows Unauthorized Authentication with Non-CA Signed Certificates - DailyCVE
2024-12-10 This article describes a vulnerability in LXD PKI mode that allows unauthorized authentication with non-CA signed certificates if they […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Pocket-Sized Perfection: Rode Wireless Micro Review
https://undercodenews.com/pocket-sized-perfection-rode-wireless-micro-review/
@Undercode_News
https://undercodenews.com/pocket-sized-perfection-rode-wireless-micro-review/
@Undercode_News
UNDERCODE NEWS
Pocket-Sized Perfection: Rode Wireless Micro Review - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Apple's New Image Playground: A Creative Leap with #iOS 182
https://undercodenews.com/apples-new-image-playground-a-creative-leap-with-ios-182/
@Undercode_News
https://undercodenews.com/apples-new-image-playground-a-creative-leap-with-ios-182/
@Undercode_News
UNDERCODE NEWS
Apple's New Image Playground: A Creative Leap with iOS 182 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Rode Wireless Go 3: A Leap Forward in Wireless Audio
https://undercodenews.com/rode-wireless-go-3-a-leap-forward-in-wireless-audio/
@Undercode_News
https://undercodenews.com/rode-wireless-go-3-a-leap-forward-in-wireless-audio/
@Undercode_News
UNDERCODE NEWS
Rode Wireless Go 3: A Leap Forward in Wireless Audio - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 LXD PKI Mode Vulnerability: Unauthorized Access Through Untrusted Certificates
https://undercodenews.com/lxd-pki-mode-vulnerability-unauthorized-access-through-untrusted-certificates/
@Undercode_News
https://undercodenews.com/lxd-pki-mode-vulnerability-unauthorized-access-through-untrusted-certificates/
@Undercode_News
UNDERCODE NEWS
LXD PKI Mode Vulnerability: Unauthorized Access Through Untrusted Certificates - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Unpatched Zero-Day Threatens #Windows NTLM
https://undercodenews.com/unpatched-zero-day-threatens-windows-ntlm/
@Undercode_News
https://undercodenews.com/unpatched-zero-day-threatens-windows-ntlm/
@Undercode_News
UNDERCODE NEWS
Unpatched Zero-Day Threatens Windows NTLM - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
the Universe's Secrets: #NASA's SPHEREx Set for Launch in Late February 2025
https://undercodenews.com/the-universes-secrets-nasas-spherex-set-for-launch-in-late-february-2025/
@Undercode_News
https://undercodenews.com/the-universes-secrets-nasas-spherex-set-for-launch-in-late-february-2025/
@Undercode_News
UNDERCODE NEWS
the Universe's Secrets: NASA's SPHEREx Set for Launch in Late February 2025 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Delivering the Impossible: #Amazon's Global Reach
https://undercodenews.com/delivering-the-impossible-amazons-global-reach/
@Undercode_News
https://undercodenews.com/delivering-the-impossible-amazons-global-reach/
@Undercode_News
UNDERCODE NEWS
Delivering the Impossible: Amazon's Global Reach - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Electrica Group Under Cyber Attack: A Threat to Romania's Energy Sector
https://undercodenews.com/electrica-group-under-cyber-attack-a-threat-to-romanias-energy-sector/
@Undercode_News
https://undercodenews.com/electrica-group-under-cyber-attack-a-threat-to-romanias-energy-sector/
@Undercode_News
UNDERCODE NEWS
Electrica Group Under Cyber Attack: A Threat to Romania's Energy Sector - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🧠 #AI Pioneers: How Two Papers Revolutionized Deep Learning
https://undercodenews.com/ai-pioneers-how-two-papers-revolutionized-deep-learning/
@Undercode_News
https://undercodenews.com/ai-pioneers-how-two-papers-revolutionized-deep-learning/
@Undercode_News
UNDERCODE NEWS
AI Pioneers: How Two Papers Revolutionized Deep Learning - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Galaxy #AI Audio Eraser: A New Way to Clean Up Your Videos
https://undercodenews.com/galaxy-ai-audio-eraser-a-new-way-to-clean-up-your-videos/
@Undercode_News
https://undercodenews.com/galaxy-ai-audio-eraser-a-new-way-to-clean-up-your-videos/
@Undercode_News
UNDERCODE NEWS
Galaxy AI Audio Eraser: A New Way to Clean Up Your Videos - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔒 Level Up Your Game: Unlock Exclusive Rewards with Garena Free Fire MAX Redeem Codes
https://undercodenews.com/level-up-your-game-unlock-exclusive-rewards-with-garena-free-fire-max-redeem-codes/
@Undercode_News
https://undercodenews.com/level-up-your-game-unlock-exclusive-rewards-with-garena-free-fire-max-redeem-codes/
@Undercode_News
UNDERCODE NEWS
Level Up Your Game: Unlock Exclusive Rewards with Garena Free Fire Max Redeem Codes - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE TESTING
🦑 Social Engineering
Trape is a powerful OSINT and research tool for tracking and executing advanced social engineering techniques. It demonstrates how large corporations might exploit user data and browser vulnerabilities. Initially designed to educate about privacy risks, Trape has evolved into a tool for cybersecurity professionals and researchers to combat cybercrime.
### Key Features
#### Locator Optimization
- Tracks the target's location with 99% precision.
- Updates the path dynamically and bypasses location prompts on the target's browser.
#### REST API
- Generates customizable APIs for remote monitoring of website traffic.
- Facilitates the management of browser interactions.
#### Process Hooks
- Enables real-time phishing attacks.
- Sends malicious files to compromise targets.
- Executes custom JavaScript functions, such as keyloggers.
- Plays custom audio messages in multiple languages.
#### Public Network Tunnel
- Integrates with Ngrok to create public tunnels for managing remote attacks.
#### Credential Harvesting
- Captures target credentials during social engineering attempts.
#### Network Analysis
- Provides details on:
- Network speed (ping, upload, download).
- Connected devices and hosts.
#### Session Recognition
- Identifies active sessions and the services targets are connected to.
#### Target Profiling
- Summarizes target behavior and device information, including GPU and battery status.
---
### Usage Instructions
#### Installation
1. Clone the repository:
2. Install dependencies:
#### Execution
- Example command:
- For compatibility issues, use a Python 2.7 virtual environment:
#### Options
| Option | Description |
|------------------|-----------------------------------------------------------|
|
|
|
|
|
|
|
|
---
### Ethical Use
Trape is a tool intended for education, research, and authorized cybersecurity activities. Misusing this tool for unauthorized attacks violates ethical standards and legal regulations. Always obtain explicit consent before conducting any tests.
Trape is a powerful OSINT and research tool for tracking and executing advanced social engineering techniques. It demonstrates how large corporations might exploit user data and browser vulnerabilities. Initially designed to educate about privacy risks, Trape has evolved into a tool for cybersecurity professionals and researchers to combat cybercrime.
### Key Features
#### Locator Optimization
- Tracks the target's location with 99% precision.
- Updates the path dynamically and bypasses location prompts on the target's browser.
#### REST API
- Generates customizable APIs for remote monitoring of website traffic.
- Facilitates the management of browser interactions.
#### Process Hooks
- Enables real-time phishing attacks.
- Sends malicious files to compromise targets.
- Executes custom JavaScript functions, such as keyloggers.
- Plays custom audio messages in multiple languages.
#### Public Network Tunnel
- Integrates with Ngrok to create public tunnels for managing remote attacks.
#### Credential Harvesting
- Captures target credentials during social engineering attempts.
#### Network Analysis
- Provides details on:
- Network speed (ping, upload, download).
- Connected devices and hosts.
#### Session Recognition
- Identifies active sessions and the services targets are connected to.
#### Target Profiling
- Summarizes target behavior and device information, including GPU and battery status.
---
### Usage Instructions
#### Installation
1. Clone the repository:
git clone https://github.com/jofpin/trape.git
cd trape
2. Install dependencies:
pip3 install -r requirements.txt
#### Execution
- Example command:
python3 trape.py --url http://example.com --port 8080
- For compatibility issues, use a Python 2.7 virtual environment:
pip3 install virtualenv
virtualenv -p /usr/bin/python3 trape_env
source trape_env/bin/activate
pip3 install -r requirements.txt
#### Options
| Option | Description |
|------------------|-----------------------------------------------------------|
|
--url | URL to clone for the decoy site. ||
--port | Port for running the Trape server. ||
--accesskey | Custom key for panel access. ||
--injectcode | Custom name for REST API paths. ||
--local | Use a local HTML file as a decoy. ||
--ngrok | Token for Ngrok integration. ||
--update | Updates Trape to the latest version. ||
--help | Displays available options. |---
### Ethical Use
Trape is a tool intended for education, research, and authorized cybersecurity activities. Misusing this tool for unauthorized attacks violates ethical standards and legal regulations. Always obtain explicit consent before conducting any tests.
GitHub
GitHub - jofpin/trape: People tracker on the Internet: OSINT analysis and research tool by Jose Pino
People tracker on the Internet: OSINT analysis and research tool by Jose Pino - jofpin/trape
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Possible Signs of DDoS
Common indicators of DDoS attacks include:
● Sudden influx of requests to a specific endpoint or webpage
● Sudden spike of traffic that occurs at regular intervals or at unusual time frames
from a single IP address or multiple IP addresses
● Unusually slow network or Wi-Fi performance
● Sluggish application performance
● Prolonged inability to access websites or system files
● High processor and memory usage
● Frequent disconnection from wireless or wired internet connection
● Increased volume of spam emails
Common indicators of DDoS attacks include:
● Sudden influx of requests to a specific endpoint or webpage
● Sudden spike of traffic that occurs at regular intervals or at unusual time frames
from a single IP address or multiple IP addresses
● Unusually slow network or Wi-Fi performance
● Sluggish application performance
● Prolonged inability to access websites or system files
● High processor and memory usage
● Frequent disconnection from wireless or wired internet connection
● Increased volume of spam emails
Forwarded from Exploiting Crew (Pr1vAt3)
🦑How does DDoS Work?
While the goal of a DDoS attack is to overwhelm a target system, the tools, tactics and procedures (TTPs) employed could differ.
There are three broad categories of DDoS :
Volumetric DDoS Attacks
This category of attacks attempts to overwhelm the target system and create congestion by generating large volumes of traffic and consuming all available
bandwidth of the target.
Volumetric attacks can be achieved through simple flooding techniques, such as User Datagram Protocol (UDP) or Internet Control Message Protocol (ICMP) flooding, where the attacker sends a large number of network requests to the target system
While the goal of a DDoS attack is to overwhelm a target system, the tools, tactics and procedures (TTPs) employed could differ.
There are three broad categories of DDoS :
Volumetric DDoS Attacks
This category of attacks attempts to overwhelm the target system and create congestion by generating large volumes of traffic and consuming all available
bandwidth of the target.
Volumetric attacks can be achieved through simple flooding techniques, such as User Datagram Protocol (UDP) or Internet Control Message Protocol (ICMP) flooding, where the attacker sends a large number of network requests to the target system