Forwarded from DailyCVE
๐ด #Intel Graphics Driver Vulnerability (#CVE-2024-44160) - Critical
https://dailycve.com/intel-graphics-driver-vulnerability-cve-2024-44160-critical/
@Daily_CVE
https://dailycve.com/intel-graphics-driver-vulnerability-cve-2024-44160-critical/
@Daily_CVE
DailyCVE
Intel Graphics Driver Vulnerability (CVE-2024-44160) - Critical - DailyCVE
2024-12-11 : This article details a critical vulnerability (CVE-2024-44160) in Intel Graphics Drivers for Appleโs macOS operating system. The vulnerability [โฆ]
Forwarded from DailyCVE
๐ Checkmk, Cross-Site Scripting (XSS), #CVE-2024-38860 (MEDIUM)
https://dailycve.com/checkmk-cross-site-scripting-xss-cve-2024-38860-medium/
@Daily_CVE
https://dailycve.com/checkmk-cross-site-scripting-xss-cve-2024-38860-medium/
@Daily_CVE
DailyCVE
Checkmk, Cross-Site Scripting (XSS), CVE-2024-38860 (MEDIUM) - DailyCVE
2024-12-11 : Checkmk versions before 2.3.0p16 and 2.2.0p34 are vulnerable to Cross-Site Scripting (XSS) attacks. This vulnerability allows attackers to [โฆ]
Forwarded from DailyCVE
๐ด #Apple #iOS: Authentication Bypass (#CVE-2024-44202) - Critical
https://dailycve.com/apple-ios-authentication-bypass-cve-2024-44202-critical/
@Daily_CVE
https://dailycve.com/apple-ios-authentication-bypass-cve-2024-44202-critical/
@Daily_CVE
DailyCVE
Apple iOS: Authentication Bypass (CVE-2024-44202) - Critical - DailyCVE
2024-12-11 : An authentication bypass vulnerability (CVE-2024-44202) existed in Apple iOS versions before iOS 18 and iPadOS 18. This vulnerability [โฆ]
Forwarded from DailyCVE
๐ด #IBM Cognos Controller Vulnerability: Malicious File Upload (#CVE-2024-25019 - Critical)
https://dailycve.com/ibm-cognos-controller-vulnerability-malicious-file-upload-cve-2024-25019-critical/
@DailyCVE
https://dailycve.com/ibm-cognos-controller-vulnerability-malicious-file-upload-cve-2024-25019-critical/
@DailyCVE
DailyCVE
IBM Cognos Controller Vulnerability: Malicious File Upload (CVE-2024-25019 - Critical) - DailyCVE
2024-12-11 : IBM Cognos Controller versions 11.0.0 and 11.0.1 are vulnerable to malicious file upload due to insufficient validation of [โฆ]
Forwarded from DailyCVE
๐ด Visteon Infotainment System Local Privilege Escalation Vulnerability (#CVE-2024-8356) - Critical
https://dailycve.com/visteon-infotainment-system-local-privilege-escalation-vulnerability-cve-2024-8356-critical/
@Daily_CVE
https://dailycve.com/visteon-infotainment-system-local-privilege-escalation-vulnerability-cve-2024-8356-critical/
@Daily_CVE
DailyCVE
Visteon Infotainment System Local Privilege Escalation Vulnerability (CVE-2024-8356) - Critical - DailyCVE
2024-12-11 Visteon Infotainment System Local Privilege Escalation Vulnerability (CVE-2024-8356) โ Critical This article describes a critical vulnerability (CVE-2024-8356) in Visteon [โฆ]
Forwarded from DailyCVE
๐ด Visteon Infotainment App SoC Vulnerability (#CVE-2024-8357) - Critical
https://dailycve.com/visteon-infotainment-app-soc-vulnerability-cve-2024-8357-critical/
@Daily_CVE
https://dailycve.com/visteon-infotainment-app-soc-vulnerability-cve-2024-8357-critical/
@Daily_CVE
DailyCVE
Visteon Infotainment App SoC Vulnerability (CVE-2024-8357) - Critical - DailyCVE
2024-12-11 Vulnerability : This critical vulnerability (CVE-2024-8357) exists in Visteon Infotainment systems due to a missing immutable root of trust [โฆ]
Forwarded from DailyCVE
๐ด Visteon Infotainment System Vulnerability (#CVE-2024-8359): High Risk of Remote Code Execution
https://dailycve.com/visteon-infotainment-system-vulnerability-cve-2024-8359-high-risk-of-remote-code-execution/
@Daily_CVE
https://dailycve.com/visteon-infotainment-system-vulnerability-cve-2024-8359-high-risk-of-remote-code-execution/
@Daily_CVE
DailyCVE
Visteon Infotainment System Vulnerability (CVE-2024-8359): High Risk of Remote Code Execution - DailyCVE
2024-12-11 This article describes a critical vulnerability (CVE-2024-8359) affecting Visteon Infotainment systems. An attacker with physical access can exploit this [โฆ]
Forwarded from DailyCVE
๐ต #IBM Cognos Controller Vulnerability: Exposure of Sensitive Information (#CVE-2024-25035)
https://dailycve.com/ibm-cognos-controller-vulnerability-exposure-of-sensitive-information-cve-2024-25035/
@Daily_CVE
https://dailycve.com/ibm-cognos-controller-vulnerability-exposure-of-sensitive-information-cve-2024-25035/
@Daily_CVE
DailyCVE
IBM Cognos Controller Vulnerability: Exposure of Sensitive Information (CVE-2024-25035) - DailyCVE
2024-12-11 : This article describes a vulnerability (CVE-2024-25035) in IBM Cognos Controller versions 11.0.0 and 11.0.1. The vulnerability allows attackers [โฆ]
Forwarded from DailyCVE
๐ด #IBM Cognos Controller, Unrestricted File Upload Vulnerability, #CVE-2024-2502 (Critical)
https://dailycve.com/ibm-cognos-controller-unrestricted-file-upload-vulnerability-cve-2024-2502-critical/
@Daily_CVE
https://dailycve.com/ibm-cognos-controller-unrestricted-file-upload-vulnerability-cve-2024-2502-critical/
@Daily_CVE
DailyCVE
IBM Cognos Controller, Unrestricted File Upload Vulnerability, CVE-2024-2502 (Critical) - DailyCVE
2024-12-11 : IBM Cognos Controller versions 11.0.0 and 11.0.1 are vulnerable to malicious file upload attacks. An attacker can exploit [โฆ]
Forwarded from DailyCVE
๐ด #IBM Cognos Controller Vulnerability: #CVE-2024-45676 (Critical)
https://dailycve.com/ibm-cognos-controller-vulnerability-cve-2024-45676-critical/
@Daily_CVE
https://dailycve.com/ibm-cognos-controller-vulnerability-cve-2024-45676-critical/
@Daily_CVE
DailyCVE
IBM Cognos Controller Vulnerability: CVE-2024-45676 (Critical) - DailyCVE
2024-12-11 : A critical vulnerability (CVE-2024-45676) exists in IBM Cognos Controller versions 11.0.0 and 11.0.1. This vulnerability allows authenticated users [โฆ]
Forwarded from DailyCVE
๐ด #IBM Cognos Controller Vulnerability: Weak Cryptographic Algorithms (#CVE-2024-41775 - Critical)
https://dailycve.com/ibm-cognos-controller-vulnerability-weak-cryptographic-algorithms-cve-2024-41775-critical/
@Daily_CVE
https://dailycve.com/ibm-cognos-controller-vulnerability-weak-cryptographic-algorithms-cve-2024-41775-critical/
@Daily_CVE
DailyCVE
IBM Cognos Controller Vulnerability: Weak Cryptographic Algorithms (CVE-2024-41775 - Critical) - DailyCVE
2024-12-11 : This article details a critical vulnerability (CVE-2024-41775) found in IBM Cognos Controller versions 11.0.0 and 11.0.1. The vulnerability [โฆ]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #Galaxy Watch 4 Gets a Major Upgrade: One UI 6 Watch
https://undercodenews.com/galaxy-watch-4-gets-a-major-upgrade-one-ui-6-watch/
@Undercode_News
https://undercodenews.com/galaxy-watch-4-gets-a-major-upgrade-one-ui-6-watch/
@Undercode_News
UNDERCODE NEWS
Galaxy Watch 4 Gets a Major Upgrade: One UI 6 Watch - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฑ #Apple Watch to Monitor Blood Pressure: A Game-Changer for Health Tracking
https://undercodenews.com/apple-watch-to-monitor-blood-pressure-a-game-changer-for-health-tracking/
@Undercode_News
https://undercodenews.com/apple-watch-to-monitor-blood-pressure-a-game-changer-for-health-tracking/
@Undercode_News
UNDERCODE NEWS
Apple Watch to Monitor Blood Pressure: A Game-Changer for Health Tracking - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ Cloudflare Tunnels: A New Tool in the Hacker's Arsenal
https://undercodenews.com/cloudflare-tunnels-a-new-tool-in-the-hackers-arsenal/
@Undercode_News
https://undercodenews.com/cloudflare-tunnels-a-new-tool-in-the-hackers-arsenal/
@Undercode_News
UNDERCODE NEWS
Cloudflare Tunnels: A New Tool in the Hacker's Arsenal - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Call Recording Returns to #Galaxy S24 Series with One UI 70
https://undercodenews.com/call-recording-returns-to-galaxy-s24-series-with-one-ui-70/
@Undercode_News
https://undercodenews.com/call-recording-returns-to-galaxy-s24-series-with-one-ui-70/
@Undercode_News
UNDERCODE NEWS
Call Recording Returns to Galaxy S24 Series with One UI 70 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ A Sophisticated Cyberattack Targets UAE Residents
https://undercodenews.com/a-sophisticated-cyberattack-targets-uae-residents/
@Undercode_News
https://undercodenews.com/a-sophisticated-cyberattack-targets-uae-residents/
@Undercode_News
UNDERCODE NEWS
A Sophisticated Cyberattack Targets UAE Residents - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ China's #Digital #Espionage: A Global Threat
https://undercodenews.com/chinas-digital-espionage-a-global-threat/
@Undercode_News
https://undercodenews.com/chinas-digital-espionage-a-global-threat/
@Undercode_News
UNDERCODE NEWS
China's Digital Espionage: A Global Threat - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Lock Screen Widgets Carousel: A Missing Feature in One UI 70
https://undercodenews.com/lock-screen-widgets-carousel-a-missing-feature-in-one-ui-70/
@Undercode_News
https://undercodenews.com/lock-screen-widgets-carousel-a-missing-feature-in-one-ui-70/
@Undercode_News
UNDERCODE NEWS
Lock Screen Widgets Carousel: A Missing Feature in One UI 70 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhat is eBPF? ๐คทโ๏ธ
With Cisco Hypershield being talked about EVERYWHERE, wouldn't it be great to know a little more about the technology that the solution is predominantly built around?
eBPF (extended Berkeley Packet Filter) is a technology that lets you run secure programs within the operating system kernel. This unlocks incredible power to monitor and control systems at a granular level, without the overhead of traditional methods.
Why eBPF Matters:
โข ๐จ๐ป๐น๐ฒ๐ฎ๐๐ต๐ฒ๐ ๐๐ป๐ป๐ผ๐๐ฎ๐๐ถ๐ผ๐ป: eBPF allows developers to extend kernel functionality without modifying kernel code, enabling rapid innovation in networking, security, and observability.
โข ๐๐ผ๐ผ๐๐๐ ๐ฃ๐ฒ๐ฟ๐ณ๐ผ๐ฟ๐บ๐ฎ๐ป๐ฐ๐ฒ: eBPF programs run with incredible efficiency, minimising performance impact and maximising resource utilisation.
โข ๐๐ป๐ต๐ฎ๐ป๐ฐ๐ฒ๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐: Gain deep visibility into system behavior, detect threats in real-time, and enforce granular security policies at the kernel level.
โข ๐ฆ๐ถ๐บ๐ฝ๐น๐ถ๐ณ๐ถ๐ฒ๐ ๐ข๐ฏ๐๐ฒ๐ฟ๐๐ฎ๐ฏ๐ถ๐น๐ถ๐๐: Collect rich, detailed data on system performance and application behavior for faster troubleshooting and optimisation.
Ref: Antony Owen
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhat is eBPF? ๐คทโ๏ธ
With Cisco Hypershield being talked about EVERYWHERE, wouldn't it be great to know a little more about the technology that the solution is predominantly built around?
eBPF (extended Berkeley Packet Filter) is a technology that lets you run secure programs within the operating system kernel. This unlocks incredible power to monitor and control systems at a granular level, without the overhead of traditional methods.
Why eBPF Matters:
โข ๐จ๐ป๐น๐ฒ๐ฎ๐๐ต๐ฒ๐ ๐๐ป๐ป๐ผ๐๐ฎ๐๐ถ๐ผ๐ป: eBPF allows developers to extend kernel functionality without modifying kernel code, enabling rapid innovation in networking, security, and observability.
โข ๐๐ผ๐ผ๐๐๐ ๐ฃ๐ฒ๐ฟ๐ณ๐ผ๐ฟ๐บ๐ฎ๐ป๐ฐ๐ฒ: eBPF programs run with incredible efficiency, minimising performance impact and maximising resource utilisation.
โข ๐๐ป๐ต๐ฎ๐ป๐ฐ๐ฒ๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐: Gain deep visibility into system behavior, detect threats in real-time, and enforce granular security policies at the kernel level.
โข ๐ฆ๐ถ๐บ๐ฝ๐น๐ถ๐ณ๐ถ๐ฒ๐ ๐ข๐ฏ๐๐ฒ๐ฟ๐๐ฎ๐ฏ๐ถ๐น๐ถ๐๐: Collect rich, detailed data on system performance and application behavior for faster troubleshooting and optimisation.
Ref: Antony Owen
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAutomated Wifi Hacking:
Wifite is a Python script designed for wireless network auditing, simplifying the use of wireless-auditing tools by automating their execution. It consolidates multiple attack methods to retrieve wireless passwords efficiently.
---
Features
- Attack Methods:
- WPS:
- Offline Pixie-Dust attack
- Online Brute-Force PIN attack
- WPA:
- Handshake Capture + offline cracking
- PMKID Hash Capture + offline cracking
- WEP:
- Fragmentation, chop-chop, aireplay, and other known attacks
- Automation:
- Select targets, and Wifite will handle the attack process automatically.
- 5GHz Support:
- Limited to compatible wireless cards (-5 switch).
- Cracked Password Storage:
- Saves results in the current directory with metadata.
- De-authentication Control:
- Disable deauths using --no-deauths.
---
Supported Operating Systems
- Designed for Kali Linux (latest version).
- Also supports ParrotSec.
- Other distributions may require manual updates of tools and wireless drivers.
---
Requirements
1. Wireless Card:
- Must support Monitor Mode and packet injection.
2. Essential Tools:
- Python (compatible with Python 2 & 3)
- Networking utilities:
- iwconfig, ifconfig
- Aircrack-ng Suite:
- airmon-ng, aircrack-ng, aireplay-ng, airodump-ng, packetforge-ng
3. Recommended Tools:
- tshark, reaver, bully, coWPAtty, pyrit, hashcat, hcxdumptool, hcxpcaptool
---
Installation
1. Clone the repository:
git clone https://github.com/derv82/wifite2.git
cd wifite2
2. Run Wifite directly:
sudo ./Wifite.py
3. Install Wifite system-wide:
sudo python setup.py install
- Installed to /usr/sbin/wifite.
4. Uninstallation:
Record and delete installed files:
sudo python setup.py install --record files.txt \
&& cat files.txt | xargs sudo rm \
&& rm -f files.txt
---
Usage
Run Wifite with default settings:
sudo ./Wifite.py
Optional arguments for specific attacks:
- PMKID capture:
--pmkid
- WPS Pixie-Dust attack:
--wps-only --pixie
- WPA handshake cracking:
--no-wps
- Disable deauth:
--no-deauths
---
Advanced Features
- Hidden SSID decloaking.
- Validation of handshakes with tools like pyrit, cowpatty, and aircrack-ng.
- WEP attack customization (e.g., replay, chopchop).
- Cracked passwords stored in the current directory with access point details.
Wifite simplifies wireless security assessments, making it an essential tool for pen testers using supported Linux distributions.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAutomated Wifi Hacking:
Wifite is a Python script designed for wireless network auditing, simplifying the use of wireless-auditing tools by automating their execution. It consolidates multiple attack methods to retrieve wireless passwords efficiently.
---
Features
- Attack Methods:
- WPS:
- Offline Pixie-Dust attack
- Online Brute-Force PIN attack
- WPA:
- Handshake Capture + offline cracking
- PMKID Hash Capture + offline cracking
- WEP:
- Fragmentation, chop-chop, aireplay, and other known attacks
- Automation:
- Select targets, and Wifite will handle the attack process automatically.
- 5GHz Support:
- Limited to compatible wireless cards (-5 switch).
- Cracked Password Storage:
- Saves results in the current directory with metadata.
- De-authentication Control:
- Disable deauths using --no-deauths.
---
Supported Operating Systems
- Designed for Kali Linux (latest version).
- Also supports ParrotSec.
- Other distributions may require manual updates of tools and wireless drivers.
---
Requirements
1. Wireless Card:
- Must support Monitor Mode and packet injection.
2. Essential Tools:
- Python (compatible with Python 2 & 3)
- Networking utilities:
- iwconfig, ifconfig
- Aircrack-ng Suite:
- airmon-ng, aircrack-ng, aireplay-ng, airodump-ng, packetforge-ng
3. Recommended Tools:
- tshark, reaver, bully, coWPAtty, pyrit, hashcat, hcxdumptool, hcxpcaptool
---
Installation
1. Clone the repository:
git clone https://github.com/derv82/wifite2.git
cd wifite2
2. Run Wifite directly:
sudo ./Wifite.py
3. Install Wifite system-wide:
sudo python setup.py install
- Installed to /usr/sbin/wifite.
4. Uninstallation:
Record and delete installed files:
sudo python setup.py install --record files.txt \
&& cat files.txt | xargs sudo rm \
&& rm -f files.txt
---
Usage
Run Wifite with default settings:
sudo ./Wifite.py
Optional arguments for specific attacks:
- PMKID capture:
--pmkid
- WPS Pixie-Dust attack:
--wps-only --pixie
- WPA handshake cracking:
--no-wps
- Disable deauth:
--no-deauths
---
Advanced Features
- Hidden SSID decloaking.
- Validation of handshakes with tools like pyrit, cowpatty, and aircrack-ng.
- WEP attack customization (e.g., replay, chopchop).
- Cracked passwords stored in the current directory with access point details.
Wifite simplifies wireless security assessments, making it an essential tool for pen testers using supported Linux distributions.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - derv82/wifite2: Rewrite of the popular wireless network auditor, "wifite"
Rewrite of the popular wireless network auditor, "wifite" - derv82/wifite2
Forwarded from UNDERCODE TESTING
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhy Hardware Tools Are Essential in 2024 For WIFI hacking ?
1โฃincreased Security Standards:
Newer Wi-Fi standards like WPA3 implement enhanced encryption (e.g., SAE or Simultaneous Authentication of Equals) that resist traditional brute-force or offline cracking attacks.
WEP and WPA1 are now nearly obsolete, reducing opportunities for basic software-based attacks
2โฃLimitations of Built-In Laptop Wireless Cards:
Many laptop wireless cards lack support for Monitor Mode or packet injection, which are critical for capturing and injecting data during attacks.
Integrated cards are typically low-power, making them less effective for long-range or interference-prone environments.
3โฃSpecialized Tools for Specific Tasks:
Capturing PMKIDs, deauthing access points, and brute-forcing PINs now require higher performance and specialized chipsets found in dedicated hardware tools.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhy Hardware Tools Are Essential in 2024 For WIFI hacking ?
1โฃincreased Security Standards:
Newer Wi-Fi standards like WPA3 implement enhanced encryption (e.g., SAE or Simultaneous Authentication of Equals) that resist traditional brute-force or offline cracking attacks.
WEP and WPA1 are now nearly obsolete, reducing opportunities for basic software-based attacks
2โฃLimitations of Built-In Laptop Wireless Cards:
Many laptop wireless cards lack support for Monitor Mode or packet injection, which are critical for capturing and injecting data during attacks.
Integrated cards are typically low-power, making them less effective for long-range or interference-prone environments.
3โฃSpecialized Tools for Specific Tasks:
Capturing PMKIDs, deauthing access points, and brute-forcing PINs now require higher performance and specialized chipsets found in dedicated hardware tools.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ