Netlas.io – Telegram
Netlas.io
2K subscribers
342 photos
3 videos
465 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
Uncover v.1.0.0 by ProjectDiscovery.io was published today. This new release brings Netlas.io support.

So happy to be on board! 😃🎉💫

https://github.com/projectdiscovery/uncover/releases/tag/v1.0.0
🔥7👍21👏1
Right now you can purchase Netlas.io subnoscription with an 80% discount for a month or even a year! In 5 days the prices will go up.

Choose your pricing plan:
https://app.netlas.io/plans/
🔥41🎄1
Users of Zoho ManageEngine are being urged to patch their instances against CVE-2022-47966. This vulnerability allows an unauthenticated adversary to execute arbitrary code.

Zoho ManageEngine on Netlas.io:

👉🏼 Dork: tag.name:"manageengine_servicedesk"

👉🏼 Link to search: https://tinyurl.com/yuw2uucn
👍2🔥1👏1
Many thanks to Intercepter NG for the great post. An interesting use-case 👍👏
https://www.facebook.com/groups/1676741942723339/posts/1712949169102616/

We are pleased to give a six months Business subnoscription 🙏🎉 Join his FB group! There are a lot of pretty useful posts there.
👍2👏1😁1
A couple of interesting facts about 🔥Jenkins CVE-2023-27898, CVE-2023-27905:
⚠️ Jenkins releases from March, 2021 to March 2023 are affected
⚠️ Even unreachable from the Internet instances could be exploited
⚠️ At least 47,5K vulnerable instances available (directly reachable)

How to search vulnerable Jenkins instances on Netlas.io:
👉🏼 Dork: http.headers.x_jenkins:[2.270 TO 2.393]
👉🏼 Search link: https://tinyurl.com/487t5s8f

Here is the blog post by Aqua Nautilus Security Research Team about these CVE:
https://blog.aquasec.com/jenkins-server-vulnerabilities
🔥5👍1
This media is not supported in your browser
VIEW IN TELEGRAM
Netlas v.0.21.0 Released!

This new release brings a long awaited feature – Bookmarks. Now you can save your favorite search queries by clicking on the star icon in the search string.

Search by favicon feature is significantly improved. Now can search not only exact matches, but also nearest matches. We use perceptual hash for this. Perceptual hash algorithms are opposite to standard cryptographic hashes — they are optimized to change as little as possible for similar inputs. So you can find answers with favicons that look pretty close to a given input, but use a different color, for example.
🔥102👍2
Netlas.io is now integrated with tines.io

Want to use netlas API in your tines.io automations? Just sign in to tines, open the template library and search "Netlas". You can get any IP or domain summary, whois data, scan results and other information from any netlas.io library.

Now it's easy to use netlas.io data within tines.io stories using hundreds of automation templates with no code!
🤝5👍1
Pumps are under attack!!!

Ten vulnerabilities in Osprey pump controllers discovered by Zero Science Lab in February remain unpatched. The list of disclosed vulnerabilities includes RCE and Administrator Backdoor Access. Osprey: door-mounted, irrigation and landscape pump controllers.

Osprey pumps on Netlas.io:
👉🏼 Search: nt.ls/upZRN
👉🏼 Dork: http.noscript:(Osprey Controller)

https://www.zeroscience.mk/en/vulnerabilities/

#Friday_Horrors
😱3
Adobe ColdFusion RCE vulnerabilities:

Adobe ColdFusion 2018 Update 15 and earlier and 2021 Update 5 and earlier affected to critical CVE-2023-26359 and CVE-2023-26360. Arbitrary code execution exploited in the wild.

Netlas.io gives about 180,000 instances:
👉🏼 Dork: tag.name:"adobe_coldfusion"
👉🏼 Search link: nt.ls/adbcf

Technical analysis by Rapid7: https://attackerkb.com/topics/1iRdvtUgtW/cve-2023-26359/rapid7-analysis
🔥51
An awesome guide to create a fast passive one-shot recon noscript with Netlas CLI tools.
Do not miss the github link at the end of the article!

https://link.medium.com/q5F85TIESyb
👍3👾3🔥2
Both Domain Whois and IP Whois Datasets are finally published at https://app.netlas.io/datastore/.

Carefully collected and parsed by Netlas.io from major internet routing registries and domain registrants.

IP WHOIS Database covers all existing IPv4 addresses (more than 4 billion addresses). Each entry contains both parsed data structure and raw text records.

Domain WHOIS Database covers more than 270 millions active domains, including just registered, published and parked domains, domains on redeption grace period (waiting for renewal), and domains pending delete.

☝️All datasets and updates to them are available to Corporate and Enterprise subscribers for free.
👍5👾5
SecurePoint Authentication vulnerability

"If you sit on the river bank for a long time, you can see how the sessionId of the administrator floats by"
- Sun Tzu.

CVE-2023-22620 requires a bit of patience as the attacker has to wait for the administrator to log in, catch his sessionId, and brute force the User-Agent. However, after that, this will give full control over the root panel of the firewall.

Look at Netlas.io:
👉🏻 Dork: http.favicon.hash_sha256:ebaaed8ab7c21856f888117edaf342f6bc10335106ed907f95787b69878d9d9e
👉🏻 Search: nt.ls/k9W35

Original article: https://www.rcesecurity.com/2023/04/securepwn-part-1-bypassing-securepoint-utms-authentication-cve-2023-22620/
🔥41👾1
CVE-2023-25135: pre-authentication RCE in vBulletin with 9.8 rating 🔥

More than a month ago specialists from LexfoSecurite discovered an interesting vulnerability. It is still highly relevant.
‼️POC was published two days ago ‼️

Search on Netlas.io:
👉🏻 Dork: tag.vbulletin.version:<=5.6.9
👉🏻 Search: https://nt.ls/14sXQ

Original article: https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable
🔥4
A big list of dorks for Netlas.io has been published on GitHub!

Link: https://github.com/netlas-io/netlas-dorks
☝️ Use it to find IoT elements, monitoring systems, and more.

Over time, this list will grow. You can also send us your dorks, and we will add them. Good hunting! 🔍
👾4👍3👏1
🔥🖨🔥 PaperCut MF/NG RCE, rating 9.8

Vulnerabilities CVE-2023-27350 and CVE-2023-27351 discovered a few days ago allows unauthorized code execution in the SYSTEM context for PaperCut print management software. The software is used internally in most cases. And yet there are 1,1K instances exposed to the Internet.

Search on Netlas.io:
👉🏻 Link: https://nt.ls/ZGjrR

Vendor’s advisory: https://www.papercut.com/kb/Main/PO-1216-and-PO-1219
👾4👍1🔥1
CVE-2023-27524: session validation attacks on Apache Superset with 8.9 ratings ‼️

Search vuln on Netlas.io:
👉🏻 Dork: (http.noscript:superset http.body:SUPERSET_WEBSERVER*) OR http.favicon.hash_sha256:e186603e51173d86bfc680eee24345d67c7a1d945a8e76dc4b218bbfabed666e
👉🏻 Link: https://nt.ls/XdO7p

Check if your software is vulnerable with a noscript from Horizon3 researchers: https://github.com/horizon3ai/CVE-2023-27524
👾41👏1
Netlas module for Uncover

We hasten to share with you a short instruction on using the Netlas.io module integrated into Uncover from ProjectDiscovery.

👉🏻 Read how to use it here:
https://netlas.medium.com/using-uncover-with-netlas-io-module-77b82157ccc4
👍6👾1
Netlas is the sponsor of osintomatico conference

Do you love OSINT? So, then we have great news for you: Netlas became one of the sponsors of the osintomatico conf!

Soon, 10 CTF winners will receive certificates from us for a thousand bonus points to immerse deeper in research using our tool. Good luck to the participants!

Explore the event 👉 2023.osintomatico.com
🏆2👾2👍1🔥1