Forwarded from Backup Legal Mega
π¦More than 4 Tb Useful things
2019-new
e (Over 8000 Courses, Ebooks, Etc)
#REPOSTED (requested)
ENJOY β€οΈππ»
https://mega.nz/folder/TjAGxSLD#pi9cuU55Kqze_7v9tzsMHQ
2019-new
e (Over 8000 Courses, Ebooks, Etc)
#REPOSTED (requested)
ENJOY β€οΈππ»
https://mega.nz/folder/TjAGxSLD#pi9cuU55Kqze_7v9tzsMHQ
mega.nz
File folder on MEGA
Forwarded from WEB UNDERCODE - PRIVATE
βipβ Command cheat sheet (Command Line Reference).pdf
82.9 KB
Forwarded from WEB UNDERCODE - PRIVATE
βHacking with Metasploitβ Tutorial.pdf
1.6 MB
Forwarded from WEB UNDERCODE - PRIVATE
12 Hacking Cheatsheets That You Must Keep Handy! .pdf
206.2 KB
Forwarded from WEB UNDERCODE - PRIVATE
A Complete Docker Command List in Cheat Sheet .pdf
1.4 MB
Forwarded from WEB UNDERCODE - PRIVATE
Advanced PowerUp.ps1 Usage.pdf
726.1 KB
Forwarded from WEB UNDERCODE - PRIVATE
Auto-sslscan (Automatic SSL Scanning) .pdf
664 KB
Forwarded from WEB UNDERCODE - PRIVATE
π¦RANDOM HELPFUL WRITTEN TUTORIALS
Forwarded from Backup Legal Mega
π¦CSS: Variable Fonts -190 MB-
https://www.lynda.com/CSS-tutorials/CSS-Variable-Fonts/2822020-2.html
https://mega.nz/#F!c4E1SYjT!_2bfTEyy-oRfy6E_unAsSw
https://www.lynda.com/CSS-tutorials/CSS-Variable-Fonts/2822020-2.html
https://mega.nz/#F!c4E1SYjT!_2bfTEyy-oRfy6E_unAsSw
Lynda.com - from LinkedIn
CSS: Variable Fonts
Get a comprehensive guide to using variable fonts to make designs pop while preserving efficient use of bandwidth.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ThanatosMiner is here, to capture the mining Trojan spread by BlueKeep high-risk vulnerability attacks
#News
> the ThanatosMiner mining Trojan exploited the BlueKeep vulnerability CVE-2019-0708 to spread. The attacker packaged the public Python version BlueKeep exploit code to generate scan.exe, and scanned a large range of randomly generated IP addresses for detection and attack.
> After the vulnerability is successfully exploited, the shellcode is executed to download the Trojan svchost.exe written in C#, and then the Trojan is used to download the Monero mining Trojan and attack modules for the next round of attacks. Because the assembly name of the Payload program is ThanatosCrypt, the mining Trojan is named ThanatosMiner (Death Miner).
> On May 15, 2019, Microsoft released a security update for CVE-2019-0708, a critical remote code execution vulnerability in Remote Desktop Services, which affected some older versions of Windows. Once the attacker successfully triggers the vulnerability, he can execute arbitrary code on the target system. The triggering of the vulnerability does not require any user interaction-meaning that the computer with the vulnerability only needs to be connected to the Internet, and no remote operations may be encountered without any operation. Attack and fall. The BlueKeep vulnerability (CVE-2019-0708) is a high-risk vulnerability that all security vendors attach great importance to.
> The vulnerability affects older versions of Windows systems, including:
Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows 2003, and Windows XP. Windows 8 and Windows 10 and later versions are not affected by this vulnerability.
written by undercode
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ThanatosMiner is here, to capture the mining Trojan spread by BlueKeep high-risk vulnerability attacks
#News
> the ThanatosMiner mining Trojan exploited the BlueKeep vulnerability CVE-2019-0708 to spread. The attacker packaged the public Python version BlueKeep exploit code to generate scan.exe, and scanned a large range of randomly generated IP addresses for detection and attack.
> After the vulnerability is successfully exploited, the shellcode is executed to download the Trojan svchost.exe written in C#, and then the Trojan is used to download the Monero mining Trojan and attack modules for the next round of attacks. Because the assembly name of the Payload program is ThanatosCrypt, the mining Trojan is named ThanatosMiner (Death Miner).
> On May 15, 2019, Microsoft released a security update for CVE-2019-0708, a critical remote code execution vulnerability in Remote Desktop Services, which affected some older versions of Windows. Once the attacker successfully triggers the vulnerability, he can execute arbitrary code on the target system. The triggering of the vulnerability does not require any user interaction-meaning that the computer with the vulnerability only needs to be connected to the Internet, and no remote operations may be encountered without any operation. Attack and fall. The BlueKeep vulnerability (CVE-2019-0708) is a high-risk vulnerability that all security vendors attach great importance to.
> The vulnerability affects older versions of Windows systems, including:
Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows 2003, and Windows XP. Windows 8 and Windows 10 and later versions are not affected by this vulnerability.
written by undercode
β β β Uππ»βΊπ«Δπ¬πβ β β β