How to find out what hardware is used in a certain plantβ How to assess the level of security of a certain area's critical infrastructureβ
About this in our new article dedicated to industrial software and devices π₯
ππ» Read here: https://netlas.medium.com/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
Enjoy reading!
About this in our new article dedicated to industrial software and devices π₯
ππ» Read here: https://netlas.medium.com/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
Enjoy reading!
Medium
Searching industrial infrastructure with Netlas.io
In this article you will learn how to find industrial devices and software with Netlasβ help.
πΎ5π₯3β€1π1
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating π₯π₯π₯
The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available!
Search at Netlas.io:
ππ» Link: https://nt.ls/Vbu6L
ππ» Dork: http.headers.server:"ScreenConnect"
Vendor's advisory: https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available!
Search at Netlas.io:
ππ» Link: https://nt.ls/Vbu6L
ππ» Dork: http.headers.server:"ScreenConnect"
Vendor's advisory: https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
πΎ5π₯3β€2π€―1
CVE-2024-21722, 723, 724, 25, 26: Multiple vulns in JoomlaβοΈ
Five vulnerabilities have been discovered in the Joomla content management system that could be leveraged to execute arbitrary code on vulnerable websites.
Search at Netlas.io:
ππ» Link: https://nt.ls/dNRpZ
ππ» Dork: tag.name:"joomla"
Read more: https://www.bleepingcomputer.com/news/security/joomla-fixes-xss-flaws-that-could-expose-sites-to-rce-attacks/
Five vulnerabilities have been discovered in the Joomla content management system that could be leveraged to execute arbitrary code on vulnerable websites.
Search at Netlas.io:
ππ» Link: https://nt.ls/dNRpZ
ππ» Dork: tag.name:"joomla"
Read more: https://www.bleepingcomputer.com/news/security/joomla-fixes-xss-flaws-that-could-expose-sites-to-rce-attacks/
π₯6πΎ4β€2π¦1
Netlas.io
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating π₯π₯π₯ The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available! Search at Netlas.io: ππ» Link: https://nt.ls/Vbu6L ππ» Dork: http.headers.serβ¦
Data of more than 85 million United Healthcare customers leaked by hackers π¨
Many pharmaceutical companies in the United States were attacked using the recent vulnerability (CVE-2024-1709) in ScreenConnect, and United Healthcare itself is still restoring its infrastructure π
Some servers are still vulnerable: https://nt.ls/Vbu6L
Many pharmaceutical companies in the United States were attacked using the recent vulnerability (CVE-2024-1709) in ScreenConnect, and United Healthcare itself is still restoring its infrastructure π
Some servers are still vulnerable: https://nt.ls/Vbu6L
app.netlas.io
Discover, Research and Monitor any Assets Available Online
Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets.
πΎ3β€2π₯2π2π1π’1
We regret to inform you that due to unforeseen network issues, Netlas.io is currently unavailable. Our team is actively working to resolve the issue and restore service as soon as possible. We apologize for any inconvenience caused and appreciate your patience and understanding. Stay tuned for updates. Thank you. π
π4π3π’2β€1
π We're back online! Everything's running smoothly. Our team's investigating to prevent future incidents like this. Thanks for your patience! π
π₯6π2πΎ1
Interface update π»
To separate the site menu and the application menu, a small visual update was released. In case you lost the ASD Tool after this, we inform you that it is now located on the top panel of the interface. You can see how to find it in the picture.
Good luck with your projects and thank you for using Netlas!
To separate the site menu and the application menu, a small visual update was released. In case you lost the ASD Tool after this, we inform you that it is now located on the top panel of the interface. You can see how to find it in the picture.
Good luck with your projects and thank you for using Netlas!
πΎ5β€2π1
How to find live cameras with Netlas - short cheatsheet π
A summary of one of our most popular articles in one picture. Traveling around the world through thousands of cameras - what could be more interesting? π
π Read more here: https://medium.com/osint-ambition/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
A summary of one of our most popular articles in one picture. Traveling around the world through thousands of cameras - what could be more interesting? π
π Read more here: https://medium.com/osint-ambition/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
β€5πΎ4π₯1
Fact: old SSL/TLS certificate threatens both the reputation of the website and the security of the data the user is working withβ
How to check the certificate for yourself or a contractor?
π Just use Netlas: https://app.netlas.io/certs/
How to check the certificate for yourself or a contractor?
π Just use Netlas: https://app.netlas.io/certs/
πΎ3β€1π1
CVE-2024-27198, -27199: Auth Bypass in JetBrains TeamCity, 9.8 rating π₯
The vulnerabilities may enable an attacker to bypass authentication checks and gain administrative permissions on the TeamCity server. Affected all versions through 2023.11.3!
Search at Netlas.io:
π Link: https://nt.ls/7DYva
π Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.11.3" NOT http.body:"2023.11.4"
Vendor's advisory: https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/
The vulnerabilities may enable an attacker to bypass authentication checks and gain administrative permissions on the TeamCity server. Affected all versions through 2023.11.3!
Search at Netlas.io:
π Link: https://nt.ls/7DYva
π Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.11.3" NOT http.body:"2023.11.4"
Vendor's advisory: https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/
πΎ5π₯3π2
Website update π₯
We have changed our website a little, and now you can find much more useful materials there, including use cases, links to our resources, and updated documentation.
ππ» Read new docs and guides: https://docs.netlas.io/
We have changed our website a little, and now you can find much more useful materials there, including use cases, links to our resources, and updated documentation.
ππ» Read new docs and guides: https://docs.netlas.io/
docs.netlas.io
Netlas Docs
Insights and detailed instructions on using the Netlas.io platform and development using Netlas API and SDK.
πΎ4π₯2π1
CVE-2024-21899, -21900, -21901: Improper Authentication and other in QNAP NAS, 4.3 - 9.8 rating π₯
Code injection, execution of arbitrary commands and, most interestingly, a vulnerability in the authentication that allows an attacker to compromise the entire system via network.
Search at Netlas.io:
ππ» Link: https://nt.ls/Wnycw
ππ» Dork: http.body_sha256:4a1815f3e87d6d623c22921d9c39b2de614351d71831976bbc807f571953ff21
Vendor's advisory: https://www.qnap.com/en/security-advisory/qsa-24-09
Code injection, execution of arbitrary commands and, most interestingly, a vulnerability in the authentication that allows an attacker to compromise the entire system via network.
Search at Netlas.io:
ππ» Link: https://nt.ls/Wnycw
ππ» Dork: http.body_sha256:4a1815f3e87d6d623c22921d9c39b2de614351d71831976bbc807f571953ff21
Vendor's advisory: https://www.qnap.com/en/security-advisory/qsa-24-09
π₯7πΎ2β€1π1
APSB24-05, APSB24-14: Multiple vulns in Adobe products, critical rating π₯
Two vulnerabilities from the new Adobe security bulletin, the exploitation of which will allow an attacker to achieve arbitrary file system read, code execution, and security feature bypass.
Search at Netlas.io:
ππ» Link: https://nt.ls/EEZn7
ππ» Dork: tag.name:"adobe_experience_manager" OR tag.name:"adobe_coldfusion"
Vendor's advisory: https://helpx.adobe.com/security/security-bulletin.html
Two vulnerabilities from the new Adobe security bulletin, the exploitation of which will allow an attacker to achieve arbitrary file system read, code execution, and security feature bypass.
Search at Netlas.io:
ππ» Link: https://nt.ls/EEZn7
ππ» Dork: tag.name:"adobe_experience_manager" OR tag.name:"adobe_coldfusion"
Vendor's advisory: https://helpx.adobe.com/security/security-bulletin.html
πΎ4π₯3β€2
CVE-2024-23334: Path Traversal in aiohttp Python lib, 7.5 ratingβ
An old vulnerability that has started to gain attention again recently. According to Cyble research, attackers have been scanning nodes with a vulnerable version of the library since the end of February. We recommend that everyone who uses it update immediately!
Search at Netlas.io:
π Link: https://nt.ls/lrzzv
π Dork: http.headers.server:"aiohttp"
Read more: https://www.bleepingcomputer.com/news/security/hackers-exploit-aiohttp-bug-to-find-vulnerable-networks/
An old vulnerability that has started to gain attention again recently. According to Cyble research, attackers have been scanning nodes with a vulnerable version of the library since the end of February. We recommend that everyone who uses it update immediately!
Search at Netlas.io:
π Link: https://nt.ls/lrzzv
π Dork: http.headers.server:"aiohttp"
Read more: https://www.bleepingcomputer.com/news/security/hackers-exploit-aiohttp-bug-to-find-vulnerable-networks/
πΎ5π₯3β€2π2
π§Planned update π§
The update will last 21.03.2024 from ~08:00 - 09:00 UTC β°, during which time the application will be unavailable.
Don't forget to save the results of your work before this.
The update will last 21.03.2024 from ~08:00 - 09:00 UTC β°, during which time the application will be unavailable.
Don't forget to save the results of your work before this.
πΎ3π2π1π₯1
Media is too big
VIEW IN TELEGRAM
Major Attack Surface Discovery Tool updateπ₯
New features:
- Grouping results;
- Group searches;
- Improved color segregation;
- Hiding excluded nodes;
- History tab;
and more.
π Read more: https://blog.netlas.io/major-update-for-attack-surface-discovery-tool-4ed4f1bc80fb
π Help topic: https://docs.netlas.io/easm/
π Try now: https://app.netlas.io/asd/
Come quickly and test the new functionality of Netlas! β¨
New features:
- Grouping results;
- Group searches;
- Improved color segregation;
- Hiding excluded nodes;
- History tab;
and more.
π Read more: https://blog.netlas.io/major-update-for-attack-surface-discovery-tool-4ed4f1bc80fb
π Help topic: https://docs.netlas.io/easm/
π Try now: https://app.netlas.io/asd/
Come quickly and test the new functionality of Netlas! β¨
π₯5πΎ3β€1π1
How to find industrial objects with Netlas.io? π
Short cheat sheet based on one of our articles. A few filters will allow you to make sure that nearby factories are protected.
π Read more about industrial devices search: https://medium.com/@netlas/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
Short cheat sheet based on one of our articles. A few filters will allow you to make sure that nearby factories are protected.
π Read more about industrial devices search: https://medium.com/@netlas/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
π₯5πΎ4π1
CVE-2024-21677: Path Traversal in Atlassian Confluence, 8.3 ratingβ
The vulnerability discovered during the Bug Bounty program allows an unauthenticated attacker to carry out actions that threaten the confidentiality and availability of the system. The patch has already been released.
Search at Netlas.io:
π Link: https://nt.ls/mghaY
π Dork: http.meta:"confluence-base-url"
Vendor's bulletin: https://confluence.atlassian.com/security/security-bulletin-march-19-2024-1369444862.html
The vulnerability discovered during the Bug Bounty program allows an unauthenticated attacker to carry out actions that threaten the confidentiality and availability of the system. The patch has already been released.
Search at Netlas.io:
π Link: https://nt.ls/mghaY
π Dork: http.meta:"confluence-base-url"
Vendor's bulletin: https://confluence.atlassian.com/security/security-bulletin-march-19-2024-1369444862.html
πΎ5β€3π₯3π1π1
CVE-2024-20767: Improper Access Control in Adobe ColdFusion, 8.2 ratingβοΈ
A new vulnerability in ColdFusion that allows an unauthenticated attacker to gain access to sensitive files. PoC is available!
Search at Netlas.io:
ππ» Link: https://nt.ls/jl0cW
ππ» Dork: tag.name:"adobe_coldfusion"
Vendor's bulletin: https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html
A new vulnerability in ColdFusion that allows an unauthenticated attacker to gain access to sensitive files. PoC is available!
Search at Netlas.io:
ππ» Link: https://nt.ls/jl0cW
ππ» Dork: tag.name:"adobe_coldfusion"
Vendor's bulletin: https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html
πΎ5β€4π₯2π1
CVE-2024-31136 and other: Multiple vulns in JetBrains TeamCity, 4.1 - 7.4 ratingβ
Seven new vulnerabilities in TeamCity: Improrer Validation, Neutralization and others. Install the patch quickly!
Search at Netlas.io:
π Link: https://nt.ls/HmnT2
π Dork: tag.name:"teamcity"
Vendor's advisories: https://www.jetbrains.com/privacy-security/issues-fixed/
Seven new vulnerabilities in TeamCity: Improrer Validation, Neutralization and others. Install the patch quickly!
Search at Netlas.io:
π Link: https://nt.ls/HmnT2
π Dork: tag.name:"teamcity"
Vendor's advisories: https://www.jetbrains.com/privacy-security/issues-fixed/
πΎ4π2π₯1
CVE-2024-2879: SQL injection in LayerSlider plugin for WordPress, 9.8 rating π₯
Plugin used on millions of websites had a feature that was vulnerable to blind SQL injection. If the vulnerability was successfully exploited, the attacker could gain access to any confidential information.
Search at Netlas.io:
π Link: https://nt.ls/8CmgD
π Dork: http.body:"plugins/layerslider"
Read more: https://www.wordfence.com/blog/2024/04/5500-bounty-awarded-for-unauthenticated-sql-injection-vulnerability-patched-in-layerslider-wordpress-plugin/
Plugin used on millions of websites had a feature that was vulnerable to blind SQL injection. If the vulnerability was successfully exploited, the attacker could gain access to any confidential information.
Search at Netlas.io:
π Link: https://nt.ls/8CmgD
π Dork: http.body:"plugins/layerslider"
Read more: https://www.wordfence.com/blog/2024/04/5500-bounty-awarded-for-unauthenticated-sql-injection-vulnerability-patched-in-layerslider-wordpress-plugin/
π₯6πΎ2