Forwarded from DailyCVE
π΅Camstar Enterprise Platform and Opcenter Execution Core have unspecified vulnerabilities:
https://dailycve.com/camstar-enterprise-platform-and-opcenter-execution-core-have-unspecified-vulnerabilities
https://dailycve.com/camstar-enterprise-platform-and-opcenter-execution-core-have-unspecified-vulnerabilities
Dailycve
Camstar Enterprise Platform and Opcenter Execution Core have unspecified vulnerabilities | CVE
Details:
A universally accessible manufacturing execution system (MES) by Siemens PLM software is the Opcenter execution core (previously known as Camstar Enterprise Platform).
Camstar Business Application and Opcenter Execution Core have security flawsβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Introduction to PPTP, L2TP and SSTP:
PPTP: Point-to-Point Tunneling Protocol
(PPTP: Point to Point Tunneling Protocol)
Default port number: 1723 (TCP) Point to Point Tunneling Protocol
(PPTP) is a network technology that supports multi-protocol virtual private networks. It works on the second layer. Through this protocol, remote users can safely access the company network through the Microsoft Windows operating system and other systems equipped with a point-to-point protocol, and can dial to connect to the local ISP and securely link to the company network through the Internet.
L2TP: Layer 2 Tunneling Protocol
(L2TP: Layer 2 Tunneling Protocol)
Default port number: 1701 (UDP)
L2TP is an industry-standard Internet tunneling protocol. Its function is roughly similar to that of PPTP. For example, it can also encrypt network data streams. However, there are also differences. For example, PPTP requires the network to be an IP network, and L2TP requires a point-to-point connection for data packets; PPTP uses a single tunnel, and L2TP uses multiple tunnels; L2TP provides header compression and tunnel verification, but PPTP does not support it.
About PPTP and L2TP
Both PPTP and L2TP belong to the second layer of tunneling protocols. The PPP protocol is used to encapsulate data, and then additional headers are added for data transmission on the Internet. Although the two protocols are very similar, there are still differences in the following aspects:
1. PPTP requires the Internet to be an IP network. L2TP only requires the tunnel medium to provide a packet-oriented point-to-point connection. L2TP can be used on IP (using UDP), Frame Relay Permanent Virtual Circuits (PVCs), X.25 Virtual Circuits (VCs), or ATM networks.
2. PPTP can only establish a single tunnel between two ends. L2TP supports the use of multiple tunnels between two ends. Using L2TP, users can create different tunnels for different quality of service.
3. L2TP can provide header compression. When compressing the packet header, the system overhead (overhead) occupies
4 bytes, while the PPTP protocol occupies 6 bytes4
. L2TP can provide tunnel authentication, while PPTP does not support tunnel authentication. However, when L2TP or PPTP is used together with IPsec, IPsec can provide tunnel authentication, and there is no need to verify the tunnel on the layer 2 protocol.
5. PCVPN customized login device supports PPTP and L2TP (IPSEC) key functions.
SSTP: Secure Socket Tunneling Protocol
SSTP can create a VPN tunnel transmitted over HTTPS, thereby eliminating many problems associated with VPN connections based on PPTP (Point-to-Point Tunneling Protocol) or L2TP (Layer 2 Tunneling Protocol). Because these protocols may be blocked by some Web proxies, firewalls, and network address translation (NAT) routers between the client and the server.
This SSTP is only suitable for remote access, and cannot support VPN tunnels between sites.
Microsoft hopes that SSTP can help customers reduce problems related to IPSec VPN when IPSec VPN connections are blocked by firewalls or routers. In addition, SSTP will not cause reservation problems, because it will not change the end user's VPN control. SSTP based on VPN tunnel can be directly inserted into the interface of current Microsoft VPN client and server software.
π¦Introduction to PPTP, L2TP and SSTP:
PPTP: Point-to-Point Tunneling Protocol
(PPTP: Point to Point Tunneling Protocol)
Default port number: 1723 (TCP) Point to Point Tunneling Protocol
(PPTP) is a network technology that supports multi-protocol virtual private networks. It works on the second layer. Through this protocol, remote users can safely access the company network through the Microsoft Windows operating system and other systems equipped with a point-to-point protocol, and can dial to connect to the local ISP and securely link to the company network through the Internet.
L2TP: Layer 2 Tunneling Protocol
(L2TP: Layer 2 Tunneling Protocol)
Default port number: 1701 (UDP)
L2TP is an industry-standard Internet tunneling protocol. Its function is roughly similar to that of PPTP. For example, it can also encrypt network data streams. However, there are also differences. For example, PPTP requires the network to be an IP network, and L2TP requires a point-to-point connection for data packets; PPTP uses a single tunnel, and L2TP uses multiple tunnels; L2TP provides header compression and tunnel verification, but PPTP does not support it.
About PPTP and L2TP
Both PPTP and L2TP belong to the second layer of tunneling protocols. The PPP protocol is used to encapsulate data, and then additional headers are added for data transmission on the Internet. Although the two protocols are very similar, there are still differences in the following aspects:
1. PPTP requires the Internet to be an IP network. L2TP only requires the tunnel medium to provide a packet-oriented point-to-point connection. L2TP can be used on IP (using UDP), Frame Relay Permanent Virtual Circuits (PVCs), X.25 Virtual Circuits (VCs), or ATM networks.
2. PPTP can only establish a single tunnel between two ends. L2TP supports the use of multiple tunnels between two ends. Using L2TP, users can create different tunnels for different quality of service.
3. L2TP can provide header compression. When compressing the packet header, the system overhead (overhead) occupies
4 bytes, while the PPTP protocol occupies 6 bytes4
. L2TP can provide tunnel authentication, while PPTP does not support tunnel authentication. However, when L2TP or PPTP is used together with IPsec, IPsec can provide tunnel authentication, and there is no need to verify the tunnel on the layer 2 protocol.
5. PCVPN customized login device supports PPTP and L2TP (IPSEC) key functions.
SSTP: Secure Socket Tunneling Protocol
SSTP can create a VPN tunnel transmitted over HTTPS, thereby eliminating many problems associated with VPN connections based on PPTP (Point-to-Point Tunneling Protocol) or L2TP (Layer 2 Tunneling Protocol). Because these protocols may be blocked by some Web proxies, firewalls, and network address translation (NAT) routers between the client and the server.
This SSTP is only suitable for remote access, and cannot support VPN tunnels between sites.
Microsoft hopes that SSTP can help customers reduce problems related to IPSec VPN when IPSec VPN connections are blocked by firewalls or routers. In addition, SSTP will not cause reservation problems, because it will not change the end user's VPN control. SSTP based on VPN tunnel can be directly inserted into the interface of current Microsoft VPN client and server software.
(beaware from copyright reports and don't clone any tutorial from here :)β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅Citrix Secure Mail For Android access control error vulnerability:
https://dailycve.com/citrix-secure-mail-android-access-control-error-vulnerability
https://dailycve.com/citrix-secure-mail-android-access-control-error-vulnerability
Dailycve
Citrix Secure Mail For Android access control error vulnerability | CVE
Details:
Citrix Safe Mail For Android is an American Citrix (Citrix) email client software package.
For versions previous to 20.11.0.0, Citrix Safe Mail for Android has an access management error flaw. The flaw is linked to the affected version, whichβ¦
Forwarded from DailyCVE
π΅Viki Solutions Viki Vera Access Control Error Vulnerability:
https://dailycve.com/viki-solutions-viki-vera-access-control-error-vulnerability
https://dailycve.com/viki-solutions-viki-vera-access-control-error-vulnerability
Dailycve
Viki Solutions Viki Vera Access Control Error Vulnerability | CVE
Details:
Viki Solutions Viki Vera is a Viki Solutions Canada workflow customization tool. File transfer, work control and other features are provided by the platform.
The 4.9.1.26180 version of Viki Vera has an access management bug flaw associatedβ¦
Forwarded from UNDERCODE NEWS
For the first time in 12 years, AEON Bank reconstructed CRM, and the sales help utilization rate surpassed 95 percent.
#International
#International
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bAsic//Start point: Python Programming:
4.2 rating !
Program Python
Know the basics of Python
Write their own scripts, and functinos
free limited:
https://www.udemy.com/course/pythonforbeginnersintro/
(beaware of pirated courses, may incude malwares!!!)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bAsic//Start point: Python Programming:
4.2 rating !
Program Python
Know the basics of Python
Write their own scripts, and functinos
free limited:
https://www.udemy.com/course/pythonforbeginnersintro/
(beaware of pirated courses, may incude malwares!!!)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Udemy
Free Python Tutorial - Introduction To Python Programming
A Quick and Easy Intro to Python Programming - Free Course
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from DailyCVE
π΅Scalance X Products heap buffer overflow vulnerability:
https://dailycve.com/scalance-x-products-heap-buffer-overflow-vulnerability
https://dailycve.com/scalance-x-products-heap-buffer-overflow-vulnerability
Dailycve
Scalance X Products heap buffer overflow vulnerability | CVE
Details:
SCALANCE X is a switch for connecting industrial components, such as programmable logic controllers (PLC) or interfaces for human machines (HMIs).
An intruder will send a specially designed code to trigger this condition on the web server withβ¦
Forwarded from DailyCVE
π΅Scalance X Products hard-coded encryption key vulnerability:
https://dailycve.com/scalance-x-products-hard-coded-encryption-key-vulnerability
https://dailycve.com/scalance-x-products-hard-coded-encryption-key-vulnerability
Dailycve
Scalance X Products hard-coded encryption key vulnerability | CVE
Details:
SCALANCE X is a switch for connecting industrial components, such as programmable logic controllers (PLC) or interfaces for human machines (HMIs).
An attacker will use the vulnerability to deal with man-in-the-middle scenarios to decode previouslyβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SS7 pdfs and Videos :
https://www.riverpublishers.com/journaldownload.php?file=RP_Journal_2245-800X_512.pdf
http://positive-tech.com/storage/articles/ss7-security-report-2014-eng.pdf
https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf
https://www.itu.int/en/ITU-T/extcoop/figisymposium/Documents/ITU_SIT_WG_Technical%20report%20on%20the%20SS7%20vulnerabilities%20and%20their%20impact%20on%20DFS%20transactions_f.pdf
https://deepsec.net/docs/Slides/2018/SS7_for_INFOSEC_Paul_Coggin.pdf
https://www.enisa.europa.eu/publications/signalling-security-in-telecom-ss7-diameter-5g/at_download/fullReport
https://www.youtube.com/watch?v=z4-kNwYdX0w
https://www.youtube.com/watch?v=Wt709zRBk64
41 min
https://fedotov.co/ss7-hack-tutorial-software-video/
1 h
enjoy
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SS7 pdfs and Videos :
https://www.riverpublishers.com/journaldownload.php?file=RP_Journal_2245-800X_512.pdf
http://positive-tech.com/storage/articles/ss7-security-report-2014-eng.pdf
https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf
https://www.itu.int/en/ITU-T/extcoop/figisymposium/Documents/ITU_SIT_WG_Technical%20report%20on%20the%20SS7%20vulnerabilities%20and%20their%20impact%20on%20DFS%20transactions_f.pdf
https://deepsec.net/docs/Slides/2018/SS7_for_INFOSEC_Paul_Coggin.pdf
https://www.enisa.europa.eu/publications/signalling-security-in-telecom-ss7-diameter-5g/at_download/fullReport
https://www.youtube.com/watch?v=z4-kNwYdX0w
https://www.youtube.com/watch?v=Wt709zRBk64
41 min
https://fedotov.co/ss7-hack-tutorial-software-video/
1 h
enjoy
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from DailyCVE
π΅Mercusys Mercury X18G path traversal vulnerability:
https://dailycve.com/mercusys-mercury-x18g-path-traversal-vulnerability
https://dailycve.com/mercusys-mercury-x18g-path-traversal-vulnerability
Dailycve
Mercusys Mercury X18G path traversal vulnerability | CVE
Details:
The Mercusys Mercury X18G is China Mercusys' router.
MERCUSYS The route traversal weakness of Mercury X18G 1.0.5 stems from the inability to adequately filter special elements in the path of the resource or file. The attacker used ../ for theβ¦
Forwarded from DailyCVE
π΅Quixplorer input validation error vulnerability:
https://dailycve.com/quixplorer-input-validation-error-vulnerability
https://dailycve.com/quixplorer-input-validation-error-vulnerability
Dailycve
Quixplorer input validation error vulnerability | CVE
Details:
QuiXplorer is a web-based file manager that allows saving, copying, browsing, editing and other features for documents.
In 2.4.1 and earlier versions, Quixplorer has an input validation error weakness. A cross-site scripting attack triggeredβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Huawei switch configuration commands :
1. Configuration file related commands
[Quidway]display current-configuration Display the currently effective configuration
[Quidway]display saved-configuration Display the configuration file in the flash, that is, the configuration file used at the next power-up
reset saved-configuration Remove the old one Configuration file
reboot Switch reboot
display version Display system version information
2. Basic configuration
[Quidway]super password Modify privileged user password
[Quidway]sysname Switch naming
[Quidway]interface ethernet 1/0/1 Enter interface view
[Quidway]interface vlan 1 Enter interface view
[Quidway-Vlan-interfacex]ip address 10.1.1.11 255.255.0.0 Configure the IP address of the VLAN
[Quidway]ip route-static 0.0.0.0 0.0.0.0 10.1.1.1 Static route = gateway
3. Telnet configuration
[Quidway]user-interface vty 0 4 Enter virtual terminal
[S3026-ui-vty0-4]authentication-mode password Set password mode
[S3026-ui-vty0-4]set authentication-mode password simple xmws123 Set password
[S3026-ui-vty0-4]user privilege level 3 user level
4. Port configuration
[Quidway-Ethernet1/0/1]duplex {half|full|auto} Configure port working status
[Quidway-Ethernet1/0/1]speed {10|100|auto} Configure port working speed
[Quidway-Ethernet1 /0/1]flow-control Configure port flow control
[Quidway-Ethernet1/0/1]mdi {across|auto|normal} Configure
port link-type [Quidway-Ethernet1/0/1]port link-type {trunk |access|hybrid} Set the port working mode
[Quidway-Ethernet1/0/1] undo shutdown Activate the port
[Quidway-Ethernet1/0/2]quit Exit the system view
5. Link aggregation configuration
[DeviceA] link-aggregation group 1 mode manual Create manual aggregation group 1
[Qw_A] interface ethernet 1/0/1 Add Ethernet port Ethernet1/0/1 to aggregation group 1
[Qw_A-Ethernet1/0 /1] port link-aggregation group 1
[Qw_A-Ethernet1/0/1] interface ethernet 1/0/2 Add Ethernet port Ethernet1/0/1 to aggregation group 1
[Qw_A-Ethernet1/0/2] port link- aggregation group 1
[Qw_A] link-aggregation group 1 service-type tunnel # Create
tunnel service loopback group based on manual aggregation group.
[Qw_A] interface ethernet 1/0/1 Add the Ethernet port Ethernet1/0/1 to the service loopback group.
[Qw_A-Ethernet1/0/1] undo stp
[Qw_A-Ethernet1/0/1] port link-aggregation group 1
6. Port mirroring
[Quidway] monitor-port designated mirror port
[Quidway]port mirror designated mirrored port
[Quidway]port mirror int_list observing-port int_type int_num designated mirroring and mirroring
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Huawei switch configuration commands :
1. Configuration file related commands
[Quidway]display current-configuration Display the currently effective configuration
[Quidway]display saved-configuration Display the configuration file in the flash, that is, the configuration file used at the next power-up
reset saved-configuration Remove the old one Configuration file
reboot Switch reboot
display version Display system version information
2. Basic configuration
[Quidway]super password Modify privileged user password
[Quidway]sysname Switch naming
[Quidway]interface ethernet 1/0/1 Enter interface view
[Quidway]interface vlan 1 Enter interface view
[Quidway-Vlan-interfacex]ip address 10.1.1.11 255.255.0.0 Configure the IP address of the VLAN
[Quidway]ip route-static 0.0.0.0 0.0.0.0 10.1.1.1 Static route = gateway
3. Telnet configuration
[Quidway]user-interface vty 0 4 Enter virtual terminal
[S3026-ui-vty0-4]authentication-mode password Set password mode
[S3026-ui-vty0-4]set authentication-mode password simple xmws123 Set password
[S3026-ui-vty0-4]user privilege level 3 user level
4. Port configuration
[Quidway-Ethernet1/0/1]duplex {half|full|auto} Configure port working status
[Quidway-Ethernet1/0/1]speed {10|100|auto} Configure port working speed
[Quidway-Ethernet1 /0/1]flow-control Configure port flow control
[Quidway-Ethernet1/0/1]mdi {across|auto|normal} Configure
port link-type [Quidway-Ethernet1/0/1]port link-type {trunk |access|hybrid} Set the port working mode
[Quidway-Ethernet1/0/1] undo shutdown Activate the port
[Quidway-Ethernet1/0/2]quit Exit the system view
5. Link aggregation configuration
[DeviceA] link-aggregation group 1 mode manual Create manual aggregation group 1
[Qw_A] interface ethernet 1/0/1 Add Ethernet port Ethernet1/0/1 to aggregation group 1
[Qw_A-Ethernet1/0 /1] port link-aggregation group 1
[Qw_A-Ethernet1/0/1] interface ethernet 1/0/2 Add Ethernet port Ethernet1/0/1 to aggregation group 1
[Qw_A-Ethernet1/0/2] port link- aggregation group 1
[Qw_A] link-aggregation group 1 service-type tunnel # Create
tunnel service loopback group based on manual aggregation group.
[Qw_A] interface ethernet 1/0/1 Add the Ethernet port Ethernet1/0/1 to the service loopback group.
[Qw_A-Ethernet1/0/1] undo stp
[Qw_A-Ethernet1/0/1] port link-aggregation group 1
6. Port mirroring
[Quidway] monitor-port designated mirror port
[Quidway]port mirror designated mirrored port
[Quidway]port mirror int_list observing-port int_type int_num designated mirroring and mirroring
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅Ethereum Aleth denial of service vulnerability:
https://dailycve.com/ethereum-aleth-denial-service-vulnerability
https://dailycve.com/ethereum-aleth-denial-service-vulnerability
Dailycve
Ethereum Aleth denial of service vulnerability | CVE
Details:
Ethereum Aleth is an Ethereum community customer program built on the C++ language that follows the Ethereum protocol.
Version <=1.8.0 of the Aleth Ethereum C++ client has a service denial flaw. The weakness originates in the config.json fileβ¦