โ ๏ธPuTTY CVE-2024-31497 โ ๏ธ
๐ฐBrief: attacker can gain access to private key with public key and some signed messages on hand via forged identification signature of legitimate user. Signed messages may be publicly visible due to storage in public Git.
๐ฉPossibilities: login into any servers key was used in, supply chain attacks software maintained git, etc.
๐Affected versions: 0.80 and prior.
๐Full description: https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
๐ฐBrief: attacker can gain access to private key with public key and some signed messages on hand via forged identification signature of legitimate user. Signed messages may be publicly visible due to storage in public Git.
๐ฉPossibilities: login into any servers key was used in, supply chain attacks software maintained git, etc.
๐Affected versions: 0.80 and prior.
๐Full description: https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
๐ฑ17๐11๐ฅ3๐2๐2
MikroTik equipment is widely distributed all over the world and its security is an acute issue. In this paper, Caster covered many aspects related to the network security of MikroTik equipment.
Caster - Lockdown
https://blog.exploit.org/caster-routeros-lockdown
Caster - Lockdown
https://blog.exploit.org/caster-routeros-lockdown
โค15๐ฅ7๐4๐4โก1
Cisco equipment is widespread in production networks. In this article, Caster will demonstrate methods to protect Cisco IOS from network attacks.
Caster - Disciple
https://blog.exploit.org/caster-disciple
Caster - Disciple
https://blog.exploit.org/caster-disciple
โค16โก3๐ฅ3๐คฎ2
Poisoning attacks against Windows machines have become well known among pentesters. In this article, Caster will demonstrate how to detect poisoning attacks using Suricata.
Caster - Neurotransmitter
https://blog.exploit.org/caster-neurotransmitter
Caster - Neurotransmitter
https://blog.exploit.org/caster-neurotransmitter
๐ฅ8โค5โก2๐1๐1
Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
โค7๐5๐ฅ4โก1
UPDATE: Telegram has fixed this bug.
๐ Telegram started banning bots that send messages, where service number "
Some of popular bots (like@fabrika) got already banned.
If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).
P.S Telegram started slowly rollbacking the bans.
t.me/+42777"
is included in its content as a link.Some of popular bots (like
If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).
P.S Telegram started slowly rollbacking the bans.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฉ15๐6๐2๐2โก1
Active Directory is used in many networks and is often the target of attacks. In this article, Caster will demonstrate the capabilities of Suricata signatures to detect attacks against Active Directory.
Caster - If You Hadn't
https://blog.exploit.org/caster-ifyouhadnt
Caster - If You Hadn't
https://blog.exploit.org/caster-ifyouhadnt
โค7๐ฅ3โก1
I think network traffic analysis in pentest scenarios is vastly underrated. In this article, I will demonstrate a technique to silently analyze the security of network equipment based on traffic analysis alone.
Caster - Funeral
https://blog.exploit.org/caster-funeral
Caster - Funeral
https://blog.exploit.org/caster-funeral
โค10๐ฅ6๐5โ2โก1
๐ OWASP Netryx Release ๐
https://github.com/OWASP/www-project-netryx
We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:
JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.
Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.
HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you from RST Stream vulnerability
Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.
Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.
Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.
And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.
Don't forget to star the repository๐
#OWASP #Netryx #CyberSecurity #Java #WebSecurity
https://github.com/OWASP/www-project-netryx
We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:
JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.
Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.
HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you from RST Stream vulnerability
Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.
Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.
Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.
And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.
Don't forget to star the repository
#OWASP #Netryx #CyberSecurity #Java #WebSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ14๐9โค6๐ค2โก1
Currently we are witnessing arrest of creator of main digital privacy respecting messenger Pavel Durov.
WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. Itโs about safeguarding the right to privacy for all of us as a collective.
This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.
WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.
Letโs stand together for our fundamental digital rights and make sure this doesnโt go unnoticed. ๐ก๏ธ
#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy
We as humans are stronger and louder in unity and mass.
Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25
#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. Itโs about safeguarding the right to privacy for all of us as a collective.
This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.
WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.
Letโs stand together for our fundamental digital rights and make sure this doesnโt go unnoticed. ๐ก๏ธ
#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy
We as humans are stronger and louder in unity and mass.
Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25
#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
๐22๐14โค12๐ฅ12๐5
A researcher under the nickname Caster returns with his "Against" release to our blog.
This is an extremely specific article about attacks on MikroTik routers.
Release Date: 09/27/2024
https://blog.exploit.org/caster-against/
This is an extremely specific article about attacks on MikroTik routers.
Release Date: 09/27/2024
https://blog.exploit.org/caster-against/
๐131โคโ๐ฅ63๐39๐ฉ19๐ฅ15
TailScale is a popular solution for building virtual networks, but in the hands of a pentester, it can be a pivoting tool.
Magama Bazarov, known under his alter ego โCasterโ returns to exploit.org with his exotic release โBipolar Disorderโ about pivoting using TailScale.
https://blog.exploit.org/caster-bipolar-disorder
Magama Bazarov, known under his alter ego โCasterโ returns to exploit.org with his exotic release โBipolar Disorderโ about pivoting using TailScale.
https://blog.exploit.org/caster-bipolar-disorder
๐25๐ฅ14โค13๐ฉ8๐7
Caster strikes again!
His RouterOS configuration security analyzer โSaraโ got its own icon in the Kali Linux distribution in the form of Caster's logo.
You can install this tool directly from the Kali repository:
Unstoppable psycho!
His RouterOS configuration security analyzer โSaraโ got its own icon in the Kali Linux distribution in the form of Caster's logo.
You can install this tool directly from the Kali repository:
kali@kali:~$ sudo apt update && sudo apt install sara
Unstoppable psycho!
๐13๐ฅ10๐ฉ4โ1
Perhaps an airplane will fly over your head every few minutes, or even more than one. Services like Flightradar24 amazingly accurately show information about planes in the air because they receive data through the ADS-B protocol. This can be done independently, and I will show you how to do it.
A security researcher under the alias "Sterva" makes his debut on exploit.org with his article on processing flight information with ADS-B.
https://blog.exploit.org/ads-b-guide-demodulation-and-decoding/
A security researcher under the alias "Sterva" makes his debut on exploit.org with his article on processing flight information with ADS-B.
https://blog.exploit.org/ads-b-guide-demodulation-and-decoding/
๐11๐ฅ3๐คฎ3๐ฉ3๐คก2
Sterva continues to conquer ADS-B!
Meet his new article on exploit.org โADS-B Spoofingโ. This article explores the principles of ADS-B data transmission, encoding, and signal generation through a controlled experimental setup.
https://blog.exploit.org/ads-b-spoofing/
Meet his new article on exploit.org โADS-B Spoofingโ. This article explores the principles of ADS-B data transmission, encoding, and signal generation through a controlled experimental setup.
https://blog.exploit.org/ads-b-spoofing/
โค7๐ฅ3๐2๐ฅฑ1๐1
Magama Bazarov, known under his alter ego Caster is preparing a new release - "Philosophy of Nietzsche"
In his September work โViolenceโ he broke down the technique of pivoting on Linux with Nebula, now he will do the same on Windows with an exotic trick using ICS Sharing.
Stay tuned.
In his September work โViolenceโ he broke down the technique of pivoting on Linux with Nebula, now he will do the same on Windows with an exotic trick using ICS Sharing.
Stay tuned.
๐ฅ13โค5๐2๐ฅฑ2๐2