Forwarded from DailyCVE
π΅Huawei Jackman-AL00D 8.2.0.185(C00R2P1) CVE:
https://dailycve.com/huawei-jackman-al00d-820185c00r2p1-cve
https://dailycve.com/huawei-jackman-al00d-820185c00r2p1-cve
Dailycve
Huawei Jackman-AL00D 8.2.0.185(C00R2P1) CVE | CVE
Details:
Huawei Jackman-AL00D is the simple smartphone firmware of the Chinese corporation Huawei (Huawei).
Jackman-AL00D 8.2.0.185 (C00R2P1) version has a resource management error weakness, which results from the incorrect management of device resourcesβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
hacking & security presentations :
>>Behind the Scenes of iOS Security(https://www.youtube.com/watch?v=BLGFriOKz6U)
>>Modern iOS Application Security(https://www.infoq.com/presentations/ios-security/)
>>Demystifying the Secure Enclave Processor(https://www.youtube.com/watch?v=7UNeUT_sRos)
>>HackPac Hacking Pointer Authentication in iOS User Space(https://www.youtube.com/watch?v=DJFxhShJ6Ns)
>>Analyzing and Attacking Apple Kernel Drivers(https://www.youtube.com/watch?v=07VqX4bbXTI)
>>Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox(https://www.youtube.com/watch?v=bP5VP7vLLKo)
>>Reverse Engineering iOS Mobile Apps(https://www.bugcrowd.com/resources/webinars/reverse-engineering-ios-mobile-apps/)
>>iOS 10 Kernel Heap Revisited(https://www.youtube.com/watch?v=DNW6Im31lQo)
>>KTRW: The journey to build a debuggable iPhone(https://media.ccc.de/v/36c3-10806-ktrw_the_journey_to_build_a_debuggable_iphone)
>>The One Weird Trick SecureROM Hates(https://media.ccc.de/v/36c3-11238-the_one_weird_trick_securerom_hates)
>>Tales of old: untethering iOS 11-Spoiler: Apple is bad at patching(https://media.ccc.de/v/36c3-11034-tales_of_old_untethering_ios_11)
>>Messenger Hacking: Remotely Compromising an iPhone through iMessage(https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage)
>>Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates(https://www.youtube.com/watch?v=p512McKXukU)
>>Reverse Engineering the iOS Simulatorβs SpringBoard(https://vimeo.com/231806976)
>>Attacking iPhone XS Max(https://www.youtube.com/watch?v=8cOx7vfszZU&feature=youtu.be)
β β β Uππ»βΊπ«Δπ¬πβ β β β
hacking & security presentations :
>>Behind the Scenes of iOS Security(https://www.youtube.com/watch?v=BLGFriOKz6U)
>>Modern iOS Application Security(https://www.infoq.com/presentations/ios-security/)
>>Demystifying the Secure Enclave Processor(https://www.youtube.com/watch?v=7UNeUT_sRos)
>>HackPac Hacking Pointer Authentication in iOS User Space(https://www.youtube.com/watch?v=DJFxhShJ6Ns)
>>Analyzing and Attacking Apple Kernel Drivers(https://www.youtube.com/watch?v=07VqX4bbXTI)
>>Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox(https://www.youtube.com/watch?v=bP5VP7vLLKo)
>>Reverse Engineering iOS Mobile Apps(https://www.bugcrowd.com/resources/webinars/reverse-engineering-ios-mobile-apps/)
>>iOS 10 Kernel Heap Revisited(https://www.youtube.com/watch?v=DNW6Im31lQo)
>>KTRW: The journey to build a debuggable iPhone(https://media.ccc.de/v/36c3-10806-ktrw_the_journey_to_build_a_debuggable_iphone)
>>The One Weird Trick SecureROM Hates(https://media.ccc.de/v/36c3-11238-the_one_weird_trick_securerom_hates)
>>Tales of old: untethering iOS 11-Spoiler: Apple is bad at patching(https://media.ccc.de/v/36c3-11034-tales_of_old_untethering_ios_11)
>>Messenger Hacking: Remotely Compromising an iPhone through iMessage(https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage)
>>Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates(https://www.youtube.com/watch?v=p512McKXukU)
>>Reverse Engineering the iOS Simulatorβs SpringBoard(https://vimeo.com/231806976)
>>Attacking iPhone XS Max(https://www.youtube.com/watch?v=8cOx7vfszZU&feature=youtu.be)
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
Behind the Scenes of iOS Security
by Ivan Krstic
With over a billion active devices and in-depth security protections spanning every layer from silicon to software, Apple works to advance the state of the art in mobile security with every release of iOS. We will discuss three iOS securityβ¦
With over a billion active devices and in-depth security protections spanning every layer from silicon to software, Apple works to advance the state of the art in mobile security with every release of iOS. We will discuss three iOS securityβ¦
Forwarded from DailyCVE
π΅CuteSoft Cute Editor cross-site scripting vulnerability:
https://dailycve.com/cutesoft-cute-editor-cross-site-scripting-vulnerability-0
https://dailycve.com/cutesoft-cute-editor-cross-site-scripting-vulnerability-0
Dailycve
CuteSoft Cute Editor cross-site scripting vulnerability | CVE
Details:
CuteSoft Cute Editor is an HTML editor made in the United States by CuteSoft that can be used for PHP and ASP editing. The Cute Editor for ASP.NET 6.4 has a cross-site scripting flaw that enables remote attackers to run scripts on the victim'sβ¦
Forwarded from DailyCVE
Dailycve
PHP security vulnerabilities | CVE
Details:
PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is a universal programming scripting language open source that the PHP project collectively manages. Mainly used for Web creation, this language supports various databases and operatingβ¦
Forwarded from DailyCVE
π΅Joomla!ACL write conflict vulnerability patch:
https://dailycve.com/joomlaacl-write-conflict-vulnerability-patch
https://dailycve.com/joomlaacl-write-conflict-vulnerability-patch
Dailycve
Joomla!ACL write conflict vulnerability patch | CVE
Details:
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from DailyCVE
π΅Vidyo clickjacking vulnerability CVE-2020-35735:
https://dailycve.com/vidyo-clickjacking-vulnerability-cve-2020-35735
https://dailycve.com/vidyo-clickjacking-vulnerability-cve-2020-35735
Dailycve
Vidyo clickjacking vulnerability CVE-2020-35735 | CVE
Details:
Vidyo is a platform from Vidyo, USA that is used to support video conferencing.
Vidyo update 02-09-/D has a clickjacking flaw. The weakness stems from X-Frame-Options and other methods of security not being set. This weakness can be used byβ¦
Forwarded from UNDERCODE NEWS
Japan's 5G hit directly by Corona, can it be rebuilt in 2021?
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ How to properly protect sysctl on Linux from spoofing and Syn flooding:
Includes protection against incorrect error messages
Enable SYN cookies to prevent the server from dropping connections when the SYN queue is full
Increase SYS queue size to 2048
W akryvayut state SYN_RECV compound pre
Decrease SYN_RECV timeout value to help mitigate SYN flood attack
Save and close the file.
π¦How to reload the configuration ?
You can reload the configuration with the command:
sudo sysctl -p
I found that the sysctl -p command did not load the tcp_max_syn_backlog correctly.
Only after a reboot was the value 2048 added.
So, after running the sudo sysctl -p command, enter the command:
sudo less / proc / sys / net / ipv4 / tcp_max_syn_backlog
Make sure the value shown is 2048.
If the value is less, restart the server.
At this point, your Linux server should be better protected against SYN attacks and IP spoofing.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ How to properly protect sysctl on Linux from spoofing and Syn flooding:
This configuration will be as follows:π¦How to edit sysctl config file ?
Disable IP forwarding
Disable packet forwarding
Disable accepting ICMP redirects
Enable protection against incorrect error messages
What you need:
Linux OS
User with sudo privileges
Log into your Linux server or desktop and open a terminal window.π¦In the terminal enter the command:
sudo nano /etc/sysctl.confπ¦The above settings do the following:
First required parameter:
# net.ipv4.ip_forward = 1
change to:
net.ipv4.ip_forward = 0
Next line:
# net.ipv4.conf.all.send_redirects = 0
change to:
net.ipv4.conf.all.send_redirects = 0
Find the line:
# net.ipv4.conf.all.accept_redirects = 0
change to:
net.ipv4.conf.all.accept_redirects = 0
Add the following line below that:
net.ipv4.conf.default.accept_redirects = 0
Finally, add the following lines to the end of the file:
net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 3
net.ipv4.netfilter.ip_conpntracktime
Includes protection against incorrect error messages
Enable SYN cookies to prevent the server from dropping connections when the SYN queue is full
Increase SYS queue size to 2048
W akryvayut state SYN_RECV compound pre
Decrease SYN_RECV timeout value to help mitigate SYN flood attack
Save and close the file.
π¦How to reload the configuration ?
You can reload the configuration with the command:
sudo sysctl -p
I found that the sysctl -p command did not load the tcp_max_syn_backlog correctly.
Only after a reboot was the value 2048 added.
So, after running the sudo sysctl -p command, enter the command:
sudo less / proc / sys / net / ipv4 / tcp_max_syn_backlog
Make sure the value shown is 2048.
If the value is less, restart the server.
At this point, your Linux server should be better protected against SYN attacks and IP spoofing.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
Dailycve
Jsonpickle code issue vulnerability | CVE
Details:
Jsonpickle is a Python-based program developed by Jsonpickle's personal creator to support Python object serialization with Json.
Release 1.4.1 and previous versions of jsonpickle provide a code problem flaw that enables remote code executionβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS