Канал ламера
365 subscribers
601 photos
59 videos
494 files
3.38K links
Сборник полезной информации по информационной безопасности, авторским статьям, сливам и обзорам хак-софта с ведущих IT-каналов в ТГ. Подписывайся, ну либо пропускай все самое интересное.
Download Telegram
Forwarded from 0•Bytes•1
Я наконец то дописала большую статью про безопасность линукс на русском.
Материал для моих англоязычных читателей выйдет чуть позже

I finally wrote a long article about Linux security.
Material for my English-speaking readers will be released a little later

Приятного прочтения❤️

#vpn #linux #tor #i2p #mac #decentralization #cryptography #cve #dos #еtthernet #anonymity #attackers
#mikrotik #cve

Remote and authenticated attackers can use the vulnerability to get a root shell on the router. (CVE-2023-30799)

https://vulncheck.com/blog/mikrotik-foisted-revisited
Forwarded from APT
🖼️ RegreSSHion — OpenSSH Unauthenticated RCE

The Qualys Threat Research Unit has discovered a Remote Unauthenticated Code Execution vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this vulnerability is CVE-2024-6387.

The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems.

🔗 Research:
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server

🔗 PoC:
https://github.com/7etsuo/cve-2024-6387-poc

#openssh #glibc #rce #cve
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from APT
🖼 AnyDesk — Local Privilege Escalation (CVE-2024-12754)

A vulnerability in AnyDesk allows low-privileged users to perform arbitrary file read and copy operations with NT AUTHORITY\SYSTEM privileges. Exploitation is possible by manipulating the background image, creating symbolic links, and leveraging ShadowCopy, granting access to SAM, SYSTEM, and SECURITY files, ultimately leading to privilege escalation to administrator.

🔗 Source:
https://mansk1es.gitbook.io/AnyDesk_CVE-2024-12754

#windows #anydesk #lpe #cve
👍3