Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: SSLUnpinning - SSL Pinning Bypass Tool for Android
SSLUnpinning is a tool designed to bypass SSL pinning on Android applications. SSL pinning is a security technique that prevents man-in-the-middle (MITM) attacks by ensuring that the client only trusts a predefined certificate or public key. SSLUnpinning helps in bypassing this mechanism during security assessments or penetration testing.
---
### Basic Usage Command:
To use SSLUnpinning, you typically need to decompile the APK, patch it, and then recompile it. Here's the general approach:
1. Decompile the APK (using tools like APKTool or jadx):
2. Patch the APK with SSLUnpinning:
- Use the provided SSLUnpinning script or modify the decompiled code to disable SSL pinning manually.
3. Recompile the APK:
4. Sign the APK (to ensure it can be installed on a device):
5. Install the patched APK:
---
### Important Notes:
- SSL Pinning Bypass is useful when testing applications for vulnerabilities but can only be performed if you have authorization to do so.
- Repackaging and patching APKs may break other functionality or be detected by the application if additional protections are in place.
SSLUnpinning is a tool designed to bypass SSL pinning on Android applications. SSL pinning is a security technique that prevents man-in-the-middle (MITM) attacks by ensuring that the client only trusts a predefined certificate or public key. SSLUnpinning helps in bypassing this mechanism during security assessments or penetration testing.
---
### Basic Usage Command:
To use SSLUnpinning, you typically need to decompile the APK, patch it, and then recompile it. Here's the general approach:
1. Decompile the APK (using tools like APKTool or jadx):
apktool d app.apk
2. Patch the APK with SSLUnpinning:
- Use the provided SSLUnpinning script or modify the decompiled code to disable SSL pinning manually.
3. Recompile the APK:
apktool b app -o app_modified.apk
4. Sign the APK (to ensure it can be installed on a device):
jarsigner -verbose -sigalg MD5withRSA -digestalg SHA1 -keystore my-release-key.jks app_modified.apk alias_name
5. Install the patched APK:
adb install app_modified.apk
---
### Important Notes:
- SSL Pinning Bypass is useful when testing applications for vulnerabilities but can only be performed if you have authorization to do so.
- Repackaging and patching APKs may break other functionality or be detected by the application if additional protections are in place.
Forwarded from DailyCVE
🔵 Checkmk Multiple Vulnerabilities (#CVE-2023-43277, #CVE-2023-43278, #CVE-2023-43279)
https://dailycve.com/checkmk-multiple-vulnerabilities-cve-2023-43277-cve-2023-43278-cve-2023-43279/
@daily_cve
https://dailycve.com/checkmk-multiple-vulnerabilities-cve-2023-43277-cve-2023-43278-cve-2023-43279/
@daily_cve
DailyCVE
Checkmk Multiple Vulnerabilities (CVE-2023-43277, CVE-2023-43278, CVE-2023-43279) - DailyCVE
2024-12-04 : Checkmk, a popular IT monitoring solution, has been affected by multiple vulnerabilities. These vulnerabilities, identified as CVE-2023-43277, CVE-2023-43278, […]
Forwarded from DailyCVE
🟠 PDF-XChange Editor, Information Disclosure Vulnerability, #CVE-2024-27328 (Medium)
https://dailycve.com/pdf-xchange-editor-information-disclosure-vulnerability-cve-2024-27328-medium/
@daily_cve
https://dailycve.com/pdf-xchange-editor-information-disclosure-vulnerability-cve-2024-27328-medium/
@daily_cve
DailyCVE
PDF-XChange Editor, Information Disclosure Vulnerability, CVE-2024-27328 (Medium) - DailyCVE
2024-12-04 : This article describes a vulnerability (CVE-2024-27328) in PDF-XChange Editor that allows remote attackers to disclose sensitive information on […]
Forwarded from DailyCVE
🟠 #Adobe Animate Out-of-Bounds Read Vulnerability (#CVE-2024-20762) - MEDIUM
https://dailycve.com/adobe-animate-out-of-bounds-read-vulnerability-cve-2024-20762-medium/
@daily_cve
https://dailycve.com/adobe-animate-out-of-bounds-read-vulnerability-cve-2024-20762-medium/
@daily_cve
DailyCVE
Adobe Animate Out-of-Bounds Read Vulnerability (CVE-2024-20762) - MEDIUM - DailyCVE
2024-12-04 : Adobe Animate versions 24.0 and earlier, including 23.0.3, are vulnerable to an out-of-bounds read flaw. This vulnerability could […]
Forwarded from DailyCVE
🔴 Zabbix Server, Code Injection Vulnerability, #CVE-2024-22116 (Critical)
https://dailycve.com/zabbix-server-code-injection-vulnerability-cve-2024-22116-critical/
@daily_cve
https://dailycve.com/zabbix-server-code-injection-vulnerability-cve-2024-22116-critical/
@daily_cve
DailyCVE
Zabbix Server, Code Injection Vulnerability, CVE-2024-22116 (Critical) - DailyCVE
2024-12-04 : A critical vulnerability (CVE-2024-22116) has been identified in Zabbix server that allows attackers with limited administrative privileges to […]
Forwarded from DailyCVE
🔴 #Adobe Animate Out-of-Bounds Read Vulnerability (#CVE-2024-20797) - Critical
https://dailycve.com/adobe-animate-out-of-bounds-read-vulnerability-cve-2024-20797-critical/
@daily_cve
https://dailycve.com/adobe-animate-out-of-bounds-read-vulnerability-cve-2024-20797-critical/
@daily_cve
DailyCVE
Adobe Animate Out-of-Bounds Read Vulnerability (CVE-2024-20797) - Critical - DailyCVE
2024-12-04 : Adobe Animate versions 23.0.4 and earlier are vulnerable to an out-of-bounds read vulnerability (CVE-2024-20797). This critical vulnerability can […]
Forwarded from DailyCVE
🔴 PDF-XChange Editor, Remote Code Execution, #CVE-2024-27327 (Critical)
https://dailycve.com/pdf-xchange-editor-remote-code-execution-cve-2024-27327-critical/
@daily_cve
https://dailycve.com/pdf-xchange-editor-remote-code-execution-cve-2024-27327-critical/
@daily_cve
DailyCVE
PDF-XChange Editor, Remote Code Execution, CVE-2024-27327 (Critical) - DailyCVE
2024-12-04 : This article describes a critical vulnerability (CVE-2024-27327) in PDF-XChange Editor that allows remote attackers to execute arbitrary code […]
Forwarded from DailyCVE
🔵 #Adobe Animate Out-of-Bounds Read Vulnerability (#CVE-2024-20796) - Important
https://dailycve.com/adobe-animate-out-of-bounds-read-vulnerability-cve-2024-20796-important/
@daily_cve
https://dailycve.com/adobe-animate-out-of-bounds-read-vulnerability-cve-2024-20796-important/
@daily_cve
DailyCVE
Adobe Animate Out-of-Bounds Read Vulnerability (CVE-2024-20796) - Important - DailyCVE
2024-12-04 : Adobe Animate versions 23.0.4 and earlier are vulnerable to an out-of-bounds read vulnerability (CVE-2024-20796). This vulnerability allows attackers […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 Ubisoft Shuts Down XDefiant: A Disappointing End
https://undercodenews.com/ubisoft-shuts-down-xdefiant-a-disappointing-end/
@Undercode_News
https://undercodenews.com/ubisoft-shuts-down-xdefiant-a-disappointing-end/
@Undercode_News
UNDERCODE NEWS
Ubisoft Shuts Down XDefiant: A Disappointing End - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Veeam Patches Critical Vulnerability Exposing Service Providers to Remote Code Execution
https://undercodenews.com/veeam-patches-critical-vulnerability-exposing-service-providers-to-remote-code-execution/
@Undercode_News
https://undercodenews.com/veeam-patches-critical-vulnerability-exposing-service-providers-to-remote-code-execution/
@Undercode_News
UNDERCODE NEWS
Veeam Patches Critical Vulnerability Exposing Service Providers to Remote Code Execution - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Waze: Revolutionizing the Way We Navigate
https://undercodenews.com/waze-revolutionizing-the-way-we-navigate/
@Undercode_News
https://undercodenews.com/waze-revolutionizing-the-way-we-navigate/
@Undercode_News
UNDERCODE NEWS
Waze: Revolutionizing the Way We Navigate - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🎮 #Intel's XeSS 2: A Leap Forward in #Gaming Performance
https://undercodenews.com/intels-xess-2-a-leap-forward-in-gaming-performance/
@Undercode_News
https://undercodenews.com/intels-xess-2-a-leap-forward-in-gaming-performance/
@Undercode_News
UNDERCODE NEWS
Intel's XeSS 2: A Leap Forward in Gaming Performance - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Reaver - WPS PIN Brute-Forcing Tool
Reaver is a powerful tool designed to exploit vulnerabilities in Wi-Fi Protected Setup (WPS) to recover the PIN used for authentication in wireless routers. It allows attackers to brute-force the WPS PIN and gain access to the target network.
---
### Basic Usage Command:
Explanation:
-
-
-
-
---
### Example: Specify a WPS PIN to Brute-Force
Explanation:
-
-
---
### Example: Save Results to a File
Explanation:
-
---
### Important Notes:
1. Reaver works only on routers with WPS enabled, and the attack may take several hours to complete depending on the router's implementation of WPS.
2. Legal Considerations: Always ensure that you have explicit permission to perform wireless network penetration testing on the target system. Unauthorized use of Reaver is illegal.
Reaver is a powerful tool designed to exploit vulnerabilities in Wi-Fi Protected Setup (WPS) to recover the PIN used for authentication in wireless routers. It allows attackers to brute-force the WPS PIN and gain access to the target network.
---
### Basic Usage Command:
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -vv
Explanation:
-
reaver: Runs the Reaver tool.-
-i wlan0: Specifies the wireless network interface to use (replace wlan0 with your network interface name).-
-b XX:XX:XX:XX:XX:XX: Specifies the target router's BSSID (MAC address).-
-vv: Enables verbose output to display more information during the attack.---
### Example: Specify a WPS PIN to Brute-Force
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -p 12345670 -vv
Explanation:
-
-p 12345670: Attempts a specific WPS PIN, instead of brute-forcing the entire PIN.-
-vv: Provides detailed output for monitoring progress.---
### Example: Save Results to a File
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -vv -o /path/to/output.txt
Explanation:
-
-o /path/to/output.txt: Saves the output to a specified file for later analysis.---
### Important Notes:
1. Reaver works only on routers with WPS enabled, and the attack may take several hours to complete depending on the router's implementation of WPS.
2. Legal Considerations: Always ensure that you have explicit permission to perform wireless network penetration testing on the target system. Unauthorized use of Reaver is illegal.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ Scaling Enterprise Governance: A New Control
https://undercodenews.com/scaling-enterprise-governance-a-new-control/
@Undercode_News
https://undercodenews.com/scaling-enterprise-governance-a-new-control/
@Undercode_News
UNDERCODE NEWS
Scaling Enterprise Governance: A New Control - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Creating and Using an #Amazon Baby Registry: A Step-by-Step Guide
https://undercodenews.com/creating-and-using-an-amazon-baby-registry-a-step-by-step-guide/
@Undercode_News
https://undercodenews.com/creating-and-using-an-amazon-baby-registry-a-step-by-step-guide/
@Undercode_News
UNDERCODE NEWS
Creating and Using an Amazon Baby Registry: A Step-by-Step Guide - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Airgeddon - Wireless Security Auditing Tool
Airgeddon is a multi-use wireless security auditing tool that can be used to perform a variety of attacks on Wi-Fi networks, including WPA/WPA2 handshake capture, deauthentication attacks, and more. It is often used for auditing the security of wireless networks and cracking WPA/WPA2 passwords.
---
### Basic Usage Command:
Explanation:
-
---
### Example: Capture WPA Handshake
1. Start the tool and select your network interface.
2. Choose to perform a WPA handshake capture.
Explanation:
-
-
---
### Example: Deauthenticate Clients
Explanation:
-
-
---
### Example: Crack WPA2 Password (using captured handshake)
Once the handshake is captured, you can use Airgeddon to start a dictionary attack:
Explanation:
-
-
---
### Important Notes:
1. Airgeddon is best used for wireless network penetration testing and is highly effective for auditing WPA2 networks.
2. Make sure you have permission before using this tool on any wireless network to avoid legal issues.
3. A strong wordlist is crucial for the success of WPA password cracking. Ensure your dictionary contains possible passwords for the target network.
Airgeddon is a multi-use wireless security auditing tool that can be used to perform a variety of attacks on Wi-Fi networks, including WPA/WPA2 handshake capture, deauthentication attacks, and more. It is often used for auditing the security of wireless networks and cracking WPA/WPA2 passwords.
---
### Basic Usage Command:
airgeddon
Explanation:
-
airgeddon: Runs the Airgeddon tool (the tool will prompt you for additional options such as selecting the wireless interface).---
### Example: Capture WPA Handshake
1. Start the tool and select your network interface.
2. Choose to perform a WPA handshake capture.
airgeddon -i wlan0 --capture-handshake
Explanation:
-
-i wlan0: Specifies the wireless network interface.-
--capture-handshake: Captures the WPA/WPA2 handshake, required for password cracking.---
### Example: Deauthenticate Clients
airgeddon -i wlan0 --deauth
Explanation:
-
-i wlan0: Specifies the wireless network interface.-
--deauth: Sends deauthentication packets to clients connected to a target network, forcing them to reconnect and allowing for handshake capture.---
### Example: Crack WPA2 Password (using captured handshake)
Once the handshake is captured, you can use Airgeddon to start a dictionary attack:
airgeddon -i wlan0 --crack-wpa /path/to/wordlist.txt
Explanation:
-
-i wlan0: Specifies the wireless network interface.-
--crack-wpa: Starts a brute-force attack to crack the WPA2 password using a provided wordlist.---
### Important Notes:
1. Airgeddon is best used for wireless network penetration testing and is highly effective for auditing WPA2 networks.
2. Make sure you have permission before using this tool on any wireless network to avoid legal issues.
3. A strong wordlist is crucial for the success of WPA password cracking. Ensure your dictionary contains possible passwords for the target network.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔐 Russian Spy Game: Secret Blizzard Hijacks Other Hackers' Tools (70 words)
https://undercodenews.com/russian-spy-game-secret-blizzard-hijacks-other-hackers-tools-70-words/
@Undercode_News
https://undercodenews.com/russian-spy-game-secret-blizzard-hijacks-other-hackers-tools-70-words/
@Undercode_News
UNDERCODE NEWS
Russian Spy Game: Secret Blizzard Hijacks Other Hackers' Tools (70 words) - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Russian Hackers Exploit Pakistani Cyber Group for #Espionage
https://undercodenews.com/russian-hackers-exploit-pakistani-cyber-group-for-espionage/
@Undercode_News
https://undercodenews.com/russian-hackers-exploit-pakistani-cyber-group-for-espionage/
@Undercode_News
UNDERCODE NEWS
Russian Hackers Exploit Pakistani Cyber Group for Espionage - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔐 Russian Hackers Targeting Hackers: Turla's Stealthy Operations
https://undercodenews.com/russian-hackers-targeting-hackers-turlas-stealthy-operations/
@Undercode_News
https://undercodenews.com/russian-hackers-targeting-hackers-turlas-stealthy-operations/
@Undercode_News
UNDERCODE NEWS
Russian Hackers Targeting Hackers: Turla's Stealthy Operations - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ The Social Media Exodus: A Search for a New Twitter
https://undercodenews.com/the-social-media-exodus-a-search-for-a-new-twitter/
@Undercode_News
https://undercodenews.com/the-social-media-exodus-a-search-for-a-new-twitter/
@Undercode_News
UNDERCODE NEWS
The Social Media Exodus: A Search for a New Twitter - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…