Linux Privilege Escalation: Automated Script
https://www.hackingarticles.in/linux-privilege-escalation-automated-script/
#Linux
https://www.hackingarticles.in/linux-privilege-escalation-automated-script/
#Linux
Hacking Articles
Linux Privilege Escalation: Automated Script
Discover automated scripts for Linux privilege escalation: Identify misconfigurations, exploits, and gain root access efficiently.
Forwarded from Sys-Admin InfoSec
PDF Insecurity Website
Анализ защищённого pdf со внесением в него изменений без ведома автора:
https://pdf-insecurity.org/signature/certification.html
Анализ защищённого pdf со внесением в него изменений без ведома автора:
https://pdf-insecurity.org/signature/certification.html
CVE-2021-21985/CVE-2021-21986 : VMware vSphere Client (HTML5) contains a remote code execution vulnerability
https://attackerkb.com/topics/X85GKjaVER/cve-2021-21985
https://attackerkb.com/topics/X85GKjaVER/cve-2021-21985
AttackerKB
CVE-2021-21985 | AttackerKB
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enab…
Forwarded from Записки админа
🔍 ssh-audit - утилита для аудита SSH соединения на сервере: https://github.com/jtesta/ssh-audit
И отдельный ресурс, где можно проверить текущую настройку SSH сервера: https://www.ssh-audit.com/
#ssh #security #будничное
И отдельный ресурс, где можно проверить текущую настройку SSH сервера: https://www.ssh-audit.com/
#ssh #security #будничное
❤6
Forwarded from infosecurity
Still using SMS as 2FA?
For $16 a hacker can rerouted all received SMS messages to him and break into online accounts. This isn't SIM jacking or SS7.
Attacker just pays a company and get control of text routing in minutes
https://www.vice.com/en/article/y3g8wb/hacker-got-my-texts-16-dollars-sakari-netnumber
For $16 a hacker can rerouted all received SMS messages to him and break into online accounts. This isn't SIM jacking or SS7.
Attacker just pays a company and get control of text routing in minutes
https://www.vice.com/en/article/y3g8wb/hacker-got-my-texts-16-dollars-sakari-netnumber
VICE
A Hacker Got All My Texts for $16
A gaping flaw in SMS lets hackers take over phone numbers in minutes by simply paying a company to reroute text messages.
👏2
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Что по яблокам?! Про генератор нагрузок для мака
https://posts.specterops.io/introducing-mystikal-4fbd2f7ae520
#soft #malware
https://posts.specterops.io/introducing-mystikal-4fbd2f7ae520
#soft #malware
SpecterOps
Blog - SpecterOps
Your new best friend: Introducing BloodHound Community Edition!
🤯2❤1🌚1
Темные хроники: к чему привела атака на Colonial Pipeline
https://ics-cert.kaspersky.ru/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/
https://ics-cert.kaspersky.ru/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/
Kaspersky ICS CERT | Центр реагирования на инциденты информационной безопасности промышленных инфраструктур «Лаборатории Касперского»
Темные хроники: к чему привела атака на Colonial Pipeline | Kaspersky ICS CERT
Эта статья начиналась как обзор инцидента на Colonial Pipeline. Однако события разворачивались так стремительно, что тема публикации вышла за рамки одного инцидента.
S.E.Reborn
Темные хроники: к чему привела атака на Colonial Pipeline https://ics-cert.kaspersky.ru/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/
ZDNet
Hackers use Colonial pipeline ransomware news for phishing attack
The emails ask employees to download a “ransomware update” that is actually malware.
🎉3
Forwarded from infosecurity
ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities
https://gbhackers.com/advanced-atm-penetration-testing-methods/
https://gbhackers.com/advanced-atm-penetration-testing-methods/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
ATM Penetration Testing - Advanced Testing Methods to Find The Vulnerabilities
ATM Penetration Testing, Programmers are not restricting themselves money/card catching, skimming, and they are investigating better approaches to hack ATM
Биография основателя DEF CON и Black Hat Джеффа Мосса (Dark Tangent)
https://habr.com/ru/company/skillfactory/blog/561036/
https://habr.com/ru/company/skillfactory/blog/561036/
Хабр
Биография основателя DEF CON и Black Hat Джеффа Мосса (Dark Tangent)
К старту курса об этичном хакерстве мы перевели размещённую на сайте Black Hat биографию основателя этой серии мероприятий по кибербезопасности. Джефф Мосс родил...
❤1
Forwarded from Order of Six Angles
Список инструментов для malware analysis macos малвари
https://docs.google.com/document/d/1xOWmMueHHRke9aj3oRqNBgK69Y19hgZ7ehM4H9_Me-Y/mobilebasic
https://docs.google.com/document/d/1xOWmMueHHRke9aj3oRqNBgK69Y19hgZ7ehM4H9_Me-Y/mobilebasic
Best of Burp Suite Tutorials.
This cheatsheet is built for the Bug Bounty Hunters and Penetration Testers such in order to help them to hunt the vulnerabilties.
https://github.com/Ignitetechnologies/BurpSuite-For-Pentester
#infosec #bugbounty #ctf #oscp #Pentesting #redteam
This cheatsheet is built for the Bug Bounty Hunters and Penetration Testers such in order to help them to hunt the vulnerabilties.
https://github.com/Ignitetechnologies/BurpSuite-For-Pentester
#infosec #bugbounty #ctf #oscp #Pentesting #redteam
GitHub
GitHub - Ignitetechnologies/BurpSuite-For-Pentester: This cheatsheet is built for the Bug Bounty Hunters and penetration testers…
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite". - ...