CrackCodes 🇮🇳
6.97K subscribers
1.24K photos
247 videos
676 files
3.36K links
Official website: https://crackcodes.in

Tech_hack material : https://system32.ink
https://system32.in

About Admin : https://clavin.org/
@MCracker2002

Disscussion Group : @Indianshunters

Be Secure~
जय श्री राम
Download Telegram
https://github.com/CorrieOnly/google-dorks

43 lists of Google Dorks for a variety of purposes:

Amazon/Shopping/Carding dorks
Passwords/usernames/Juicy info dorks
Gaming/Minecraft dorks

and much more

#vulnerabilities #cybersecurity
Forwarded from Bhartiya Hunters (Founder & CEO •)
🔥NETGEAR Routers: A Playground for Hackers?
Overall, the security posture of custom binaries built by NETGEAR contained many vulnerabilities, largely due to the widespread usage of insecure C functions such as strcpy, strcat, sprintf, or from off-by-one errors. However, the majority of the binaries on the NETGEAR router were compiled with many protections in place, including stack canaries, non-executable stack (NX), position-independent code (PIE) and address layout randomization (ASLR) enabled. These protections made many of the vulnerabilities identified difficult to exploit on their own.

Content:
💾 Summary
💾 Advisories
💾 Vulnerabilities
💽 Telnet
📀 PSV-2023-0008 – Telnet Default Account Privilege Escalation Breakout
💽 Web Application
📀 PSV-2022-???? – JSON Response Stack Data Leak
💽 SOAP Service
📀 PSV-2023-0009 – Write HTTP Response Stack Pointer Leak
📀 PSV-2022-???? – SOAPAction Stack Buffer Overflow
📀 PSV-2023-0010 – HTTP Body Off-By-One NULL Terminator Stack Canary Corruption
📀 PSV-2023-0011 – HTTP Protocol Stack Buffer Overflow
📀 PSV-2023-0012 – SOAP Parameters Stack Buffer Overflow
💾 Conclusion