انجام فاز شناخت با NMAP بدون گذاشتن ردپا
به این فکر کنید که چطور این عملیات را کشف کنید ؟
https://infosecwriteups.com/evading-detection-while-using-nmap-69633df091f3
@Engineer_Computer
به این فکر کنید که چطور این عملیات را کشف کنید ؟
https://infosecwriteups.com/evading-detection-while-using-nmap-69633df091f3
@Engineer_Computer
Medium
Evading Detection while using nmap
Understanding how nmaplowercheck will give you away
https://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/
https://github.com/N1k0la-T/CVE-2023-36745
@Engineer_Computer
https://github.com/N1k0la-T/CVE-2023-36745
@Engineer_Computer
Daily CyberSecurity
Microsoft Exchange Server RCE (CVE-2023-36745) Flaw Gets PoC Exploit
Proof-of-concept (PoC) exploit code has been published for a Microsoft Exchange Server vulnerability tracked as CVE-2023-36745
#sans #usefull_links
Noticing command and control channels by reviewing DNS protocols
https://isc.sans.edu/diary/Noticing+command+and+control+channels+by+reviewing+DNS+protocols/30396
@Engineer_Computer
Noticing command and control channels by reviewing DNS protocols
https://isc.sans.edu/diary/Noticing+command+and+control+channels+by+reviewing+DNS+protocols/30396
@Engineer_Computer
SANS Internet Storm Center
Noticing command and control channels by reviewing DNS protocols - SANS Internet Storm Center
Noticing command and control channels by reviewing DNS protocols, Author: Manuel Humberto Santander Pelaez
🔥1
آسیب پذیریهای با اولویت بالا
اعلامی از سوی CISA
ویندوز، سوفوس، اوراکل
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
@Engineer_Computer
اعلامی از سوی CISA
ویندوز، سوفوس، اوراکل
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
@Engineer_Computer
Cybersecurity and Infrastructure Security Agency CISA
Known Exploited Vulnerabilities Catalog | CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the…
❤1