■■□□□ Novastar-VNNOX-iCare(Novaicare) V7.16.0 [Multiple Privilege Escalation flaws]
https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation
https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation
GitHub
GitHub - viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation: Novastar Novaicare : It is used to centrally monitor display status…
Novastar Novaicare : It is used to centrally monitor display status of LED screens affected by Privilege Escalation Bug - viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation
■■■□□ FaPro: A Fake Protocol Server tool, Can easily start or stop multiple network services.
The goal is to support as many protocols as possible, and support as many deep interactions as possible for each protocol.
https://github.com/fofapro/fapro
The goal is to support as many protocols as possible, and support as many deep interactions as possible for each protocol.
https://github.com/fofapro/fapro
GitHub
GitHub - fofapro/fapro: Fake Protocol Server
Fake Protocol Server. Contribute to fofapro/fapro development by creating an account on GitHub.
■□□□□ United States 🇺🇸: The Biden administration is expected to issue sanctions against crypto exchanges, wallets, and traders used by ransomware gangs to convert ransom payments into fiat money.
■■■□□ Data-Leak / Cyber-Attack: #teamHDP – #Venezuelan #hacker group exposes #DCGIM and #SEBIN
https://cybershafarat.com/2021/09/17/teamhdp-venezuelan-hacker-group-exposes-dcgim-and-sebin/
https://cybershafarat.com/2021/09/17/teamhdp-venezuelan-hacker-group-exposes-dcgim-and-sebin/
The Cyber Shafarat -
#teamHDP – #Venezuelan #hacker group exposes #DCGIM and #SEBIN
“To the Venezuelan regime we are ready by land, sea and air, have the certainty that we will be relentless and will unleash all God’s rage upon whomever tries to stop us in the liberati…
cKure
■■■□□ Israel 🇮🇱: Israeli firm Kape Technologies buys ExpressVPN raising privacy concerns. Kape Technologies is an Israeli cybersecurity firm that has bought ExpressVPN for $936 million. However, its users are now flipping out. https://www.hackread.com/israeli…
■■□□□ Edward Snowden urges users to stop using ExpressVPN.
The statement comes amid Israel 🇮🇱 based company took over the VPN giant.
Postscript: Like companies in China 🇨🇳 have to share data with government on demand. Similarly in Israel, it is more ubiquitous as data of private companies is almost always shared with the government. The state literally owns the data of the organisations.
The statement comes amid Israel 🇮🇱 based company took over the VPN giant.
Postscript: Like companies in China 🇨🇳 have to share data with government on demand. Similarly in Israel, it is more ubiquitous as data of private companies is almost always shared with the government. The state literally owns the data of the organisations.
cKure
■□□□□ Cyber-Attack: Anonymous hacktivist collective claims has claimed to have hacked the controversial web hosting provided Epik and stolen its data, including information of the clients of the company, as part of an operation codenamed EPIKFAIL.
■■□□□ Epik hack exposes lax security practices at controversial web host.
https://portswigger.net/daily-swig/epik-hack-exposes-lax-security-practices-at-controversial-web-host
https://portswigger.net/daily-swig/epik-hack-exposes-lax-security-practices-at-controversial-web-host
The Daily Swig | Cybersecurity news and views
Epik hack exposes lax security practices at controversial web host
ISP guilty of ‘laziest design possible’, critics allege
■□□□□ United States 🇺🇸: AT&T Free Msg: You know you shouldn’t click … so we did it for you!
https://securityboulevard.com/2021/09/att-free-msg-you-know-you-shouldnt-click-so-we-did-it-for-you/
https://securityboulevard.com/2021/09/att-free-msg-you-know-you-shouldnt-click-so-we-did-it-for-you/
cKure
Photo
■■■□□ Anonymous Hacktivists Leak 180 GB of Data from Web Host Epik.
https://www.ehackingnews.com/2021/09/anonymous-hacktivists-leak-180-gb-of.html
https://www.ehackingnews.com/2021/09/anonymous-hacktivists-leak-180-gb-of.html
cKure
■■□□□ Novastar-VNNOX-iCare(Novaicare) V7.16.0 [Multiple Privilege Escalation flaws] https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation
● ICYMI: The vulnerabilities in this (t.me/cKure/9386) post have not been fixed by the vendor. So technically they are zero-day issues.
Telegram
cKure
■■□□□ Novastar-VNNOX-iCare(Novaicare) V7.16.0 [Multiple Privilege Escalation flaws]
https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation
https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation
■□□□□ Information security specialists from Kaspersky Lab reported that hackers are trying to attack Russian companies through a new vulnerability in Microsoft Office products. At least one attack targeted government agencies. Using the vulnerability, attackers can not only spy on users of the infected system, but also download malicious programs like ransomware viruses into it. Experts expect that hackers will actively exploit the system's flaw, as users are slow to install updates.
https://www.ehackingnews.com/2021/09/hackers-attack-russian-organizations.html
https://www.ehackingnews.com/2021/09/hackers-attack-russian-organizations.html
■□□□□ ntlm_theft: A tool for generating multiple types of NTLMv2 hash theft files.
https://github.com/Greenwolf/ntlm_theft
https://github.com/Greenwolf/ntlm_theft
GitHub
GitHub - Greenwolf/ntlm_theft: A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf) - Greenwolf/ntlm_theft
■■■□□ Hunting for OMI Vulnerability Exploitation with Azure Sentinel.
https://techcommunity.microsoft.com/t5/azure-sentinel/hunting-for-omi-vulnerability-exploitation-with-azure-sentinel/ba-p/2764093
https://techcommunity.microsoft.com/t5/azure-sentinel/hunting-for-omi-vulnerability-exploitation-with-azure-sentinel/ba-p/2764093
TECHCOMMUNITY.MICROSOFT.COM
Hunting for OMI Vulnerability Exploitation with Azure Sentinel | Microsoft Community Hub
Microsoft Threat Intelligence Center (MSTIC) have been monitoring for signs of exploitation of the OMI vulnerability and...
■■■■□ Zero-click RCE vulnerability in Hikvision security cameras could lead to network compromise
https://portswigger.net/daily-swig/zero-click-rce-vulnerability-in-hikvision-security-cameras-could-lead-to-network-compromise
https://portswigger.net/daily-swig/zero-click-rce-vulnerability-in-hikvision-security-cameras-could-lead-to-network-compromise
portswigger.net
Web Application Security, Testing, & Scanning - PortSwigger
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.
👍1
■■■■■ A (v3.5 compatible) .NET tool for stealing and importing certificates in the Windows certificate store without touching disk. Useful for red team operations where you need to poach a certificate for pivoting purposes and want to do so with an in-memory post-ex payload.
This is similar to Benjamin Delpy's Mimikatz.
https://github.com/TheWover/CertStealer
This is similar to Benjamin Delpy's Mimikatz.
https://github.com/TheWover/CertStealer
GitHub
GitHub - TheWover/CertStealer: A .NET tool for exporting and importing certificates without touching disk.
A .NET tool for exporting and importing certificates without touching disk. - TheWover/CertStealer
■■■■■ Zero-Day: PoC CVE-2021-30632 - Out of bounds write in V8.
Tested against Samsung Internet Browser v15.0.2.47, which does not yet have Google's patch.
https://github.com/Phuong39/PoC-CVE-2021-30632
Tested against Samsung Internet Browser v15.0.2.47, which does not yet have Google's patch.
https://github.com/Phuong39/PoC-CVE-2021-30632
GitHub
GitHub - Phuong39/PoC-CVE-2021-30632: PoC CVE-2021-30632 - Out of bounds write in V8
PoC CVE-2021-30632 - Out of bounds write in V8. Contribute to Phuong39/PoC-CVE-2021-30632 development by creating an account on GitHub.
■■□□□ Interesting thread: 🌐 BlackMatter Ransomware group just ransomed another food critical infrastructure in the US, The ransom demand is 5,900,000$ for now 🚨
The victim is playing by the rules: "@CISAgov is going to be demanding answers from us within the next 12 hours" 🧐
#BlackMatter
https://twitter.com/ido_cohen2/status/1439863554606305286
The victim is playing by the rules: "@CISAgov is going to be demanding answers from us within the next 12 hours" 🧐
#BlackMatter
https://twitter.com/ido_cohen2/status/1439863554606305286
Twitter
DarkFeed
🌐 BlackMatter #Ransomware group just ransomed another food critical infrastructure in the US, The ransom demand is 5,900,000$ for now 🚨 The victim is playing by the rules: "@CISAgov is going to be demanding answers from us within the next 12 hours" 🧐#BlackMatter