Celestial writeup di Hack the Box è online! Una macchina divertente servizio nodejs exploitable 😎
http://bit.ly/2P8IEie
http://bit.ly/2P8IEie
ExploitNetworking
[HTB] Celestial writeup
Visita l'articolo per saperne di più.
First post for network category 😁
Allow and block P2P connections on FortiGate (Torrent)
http://bit.ly/2NqorUW
Allow and block P2P connections on FortiGate (Torrent)
http://bit.ly/2NqorUW
ExploitNetworking
Allow and block P2P connections on FortiGate (Torrent)
In this post we will see how to allow or block 2P2 traffic inside our fortinet.
Primo post della categoria network 😁
Permettere e bloccare connessioni P2P su FortiGate (Torrent)
http://bit.ly/2wojaGR
Permettere e bloccare connessioni P2P su FortiGate (Torrent)
http://bit.ly/2wojaGR
ExploitNetworking
Permettere e bloccare connessioni P2P su FortiGate (Torrent)
In questo post andremo a vedere come permettere o bloccare il traffico 2P2 all’interno del nostro fortinet.
Ecco il writeup della challenge web del ctf TokyoWesterns CTF, bypass dell'autenticazione, grazie alla manipolazione della funzione parse_str di php, e ottenere la flag! 🤓
-----
Writeup of TokyoWesterns CTF, bypass authentication with manipulation of the php parse_str function and get the flag! 🤓 http://bit.ly/2wDHHqD #HackLearning #Hacking #CyberSecurity #infosec #ctfwriteup
-----
Writeup of TokyoWesterns CTF, bypass authentication with manipulation of the php parse_str function and get the flag! 🤓 http://bit.ly/2wDHHqD #HackLearning #Hacking #CyberSecurity #infosec #ctfwriteup
ExploitNetworking
SimpleAuth
Welcome back on Exploitnetworking. SimpleAuth is a web challenge of TokyoWesterns CTF. The base of this challenge is manipulate the php function parse_str to bypass auth control and get the flag.
È un Luna Park. Imbarazzante 😅
It's a Luna Park. Embarrassing 😅
https://motherboard.vice.com/it/article/3ke8qj/rousseau-hack-rogue0-intervista-movimento-5-stelle?utm_source=mbfbit
It's a Luna Park. Embarrassing 😅
https://motherboard.vice.com/it/article/3ke8qj/rousseau-hack-rogue0-intervista-movimento-5-stelle?utm_source=mbfbit
Motherboard
'È un luna park ormai': abbiamo parlato con l'hacker di Rousseau
Database, liste di donatori e persino il numero di Luigi Di Maio e Toninelli: per l'hacker di Rousseau è quasi come un passatempo.
Each operating system has its default file system, each with its merits and defects; APFS for Mac OSX, Ext4 for Linux and NTFS for Windows. We analyze the NTFS to understand how it behaves with the permissions associated with files and folders.
http://bit.ly/2MWaG45
http://bit.ly/2MWaG45
ExploitNetworking
NTFS permissions in Windows
Each operating system has its default file system, each with its merits and defects; APFS for Mac OSX, Ext4 for Linux and NTFS for Windows. We analyze the NTFS to understand how it behaves with the…
Ogni sistema operativo ha il suo file system predefinito, ciascuno con i suoi pregi e difetti; APFS per Mac OSX, Ext4 per Linux e NTFS per Windows. Analizziamo l’NTFS per capire come si comporta con i permessi associati a file e cartelle.
http://bit.ly/2QfnYql
http://bit.ly/2QfnYql
ExploitNetworking
I permessi NTFS in Windows
Ogni sistema operativo ha il suo file system predefinito, ciascuno con i suoi pregi e difetti; APFS per Mac OSX, Ext4 per Linux e NTFS per Windows. Analizziamo l’NTFS per capire come si comporta co…
The writeup of PingPong challenge of @sectctf is online! Pretty challenge with a ropchain 🤓 http://bit.ly/2xa7TKM #hack #CTF #infosec #CyberSecurity
ExploitNetworking
PingPong
Welcome back on Exploitnetworking! PingPong was a pwn challenge of SECT CTF 2018, based on buffer overflow. The main goal was use an overflow to leak the memory addresses of remote libc (for bypass…
Il writeup della challenge PingPong di SECT CTF è online! Una sfida molto interessante con una ropchain! 🤓 #hack #CTF #infosec #CyberSecurity https://exploitnetworking.com/security/pingpong-2
ExploitNetworking
PingPong
Bentornati su Exploitnetworking! PingPong era una challenge del CTF SECT 2018, un pwn basato su buffer overflow. L’obiettivo principale era usare l’overflow per avere un leak di un indirizzo di mem…
Writeup of Puppetmatryoshka challenge of @sectctf is online! Interesting misc challenge with a tcpdump capture file http://bit.ly/2p67Ue3 #hack #networking #infosecurity
ExploitNetworking
Puppetmatryoshka
Welcome back on Exploitnetworking! Puppetmatryoshka was a misc challenge of SECT CTF 2018 where it was necessary inspect a pcap file.
Il writeup della challenge Puppetmatryoshka del ctf SECT CTF è online! Una interessante misc challenge con un file di pacchetti catturati con tcpdump! 🤓 #hack #networking #infosec https://exploitnetworking.com/security/puppetmatryoshka-2
ExploitNetworking
Puppetmatryoshka
Bentornati su Exploitnetworking! Puppetmatryoshka era una misc challenge del ctf SECTCTF 2018 dove era necessario ispezionare un file pcap.
Alienise, a fun web challenge of @sectctf, abuse of nginx misconfiguration for get the flag! 🤓😎 Writeup here: http://bit.ly/2Nfflyl #Hacking #ctf #infosec #CyberSecurity
ExploitNetworking
Alienise
Alienise was a web challenge of SECT CTF 2018, where you abuse of a nginx misconfiguration for get the flag.
Alienise, una divertente web challenge del ctf SETC CTF 2018, abusare di una "errata" configurazione di nginx per ottenere la flag! 🤓😎 #Hacking #ctf #infosec #CyberSecurity Ecco il Writeup https://exploitnetworking.com/security/alienise-2
ExploitNetworking
Alienise
Alienise era una challenge web del ctf SECT 2018, dove bisognava abusare di una misconfiguration di nginx per ottenere la flag.
Il backup, probabilmente una delle cose fondamentali se non si vuole rimanere fregati in ambito informatico. Solo al pensiero di perdere dati importanti all’interno di un’azienda fa venire i brividi. Quindi cerchiamo di capire che cos’è il backup e i suoi vari tipi.
http://bit.ly/2OuU008
http://bit.ly/2OuU008
ExploitNetworking
Capire i metodi e i tipi di backup
Il backup, probabilmente una delle cose fondamentali se non si vuole rimanere fregati in ambito informatico. Solo al pensiero di perdere dati importanti all’interno di un’azienda fa venire i brivid…
The backup, probably one of the most important things if you do not want to be screwed in IT. Only at the thought of losing important data within a company is the creepy. So we try to understand what backup is and its various types.
http://bit.ly/2xsc83M
http://bit.ly/2xsc83M
ExploitNetworking
Understanding the methods and types of backups
The backup, probably one of the most important things if you do not want to be screwed in IT. Only at the thought of losing important data within a company is the creepy. So we try to understand wh…
Facebook Security Breach Exposes Accounts of 50 Million Users
Image
https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html
Image
https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html
NY Times
Facebook Security Breach Exposes Accounts of 50 Million Users (Published 2018)
The attack added to the company’s woes as it contends with fallout from its role in a Russian disinformation campaign.
Facebook violato, colpiti fino a 50 milioni di utenti
https://www.wired.it/internet/social-network/2018/09/28/facebook-violato/
https://www.wired.it/internet/social-network/2018/09/28/facebook-violato/
Wired
Facebook violato, colpiti fino a 50 milioni di utenti
Quasi 50 milioni di account Facebook sono stati colpiti da un attacco hacker, le azioni della società sono scese del 3% dopo la diffusione della notizia
Sunday writeup of Hack The Box is online! Interesting and different machine with Solaris OS 🤓 #Hacking #CyberSecurity #PenTest #infosec http://bit.ly/2Ovs7sb
ExploitNetworking
[HTB] Sunday
Welcome back on Exploitnetworking! Today we’ll see the writeup of Hack The Box Sunday machine. This box was been really easy because with a simple nmap and with some enumerations you can enter in s…