⭕️ تحلیل آسیب پذیری جدیدی با شناسه : CVE-2022-21703 در گرافانا کشف شده را در لینک زیر بخونید.
نکته : اون شرکتی که گرافانا رو رنگ کرده بود بجای محصول بومی قالب کرده بود توی دولتی ها الان آپدیت کرده این آسیب پذیری ها رو ؟:)))
https://jub0bs.com/posts/2022-02-08-cve-2022-21703-writeup/
#grafana #writeup
نکته : اون شرکتی که گرافانا رو رنگ کرده بود بجای محصول بومی قالب کرده بود توی دولتی ها الان آپدیت کرده این آسیب پذیری ها رو ؟:)))
https://jub0bs.com/posts/2022-02-08-cve-2022-21703-writeup/
#grafana #writeup
Grafana Labs
Grafana | Query, visualize, alerting observability platform
Grafana feature overview, screenshots, videos, and feature tours.
👍6😁2
Zero-Click #PoC Trigger for CVE-2021-1965 (Qualcomm SnapDragon WiFi Driver #RCE)
@securation
https://github.com/parsdefense/CVE-2021-1965/blob/main/CVE-2021-1965-poc.c
https://source.codeaurora.org/quic/qsdk/platform/vendor/qcom-opensource/wlan/qca-wifi-host-cmn/commit/?id=a426e5e1668fff3dfe8bde777a9340cbc129f8df
#exploit #Qualcomm #snapdragon@securation
⭕️ نگاهی به شکار تهدیدات سایبری با استفاده از sysmon
https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon
#log #monitoring #sysmon
@securation
https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon
#log #monitoring #sysmon
@securation
Shell is Only the Beginning
Operating Offensively Against Sysmon
Sysmon is a tool written by Mark Russinovich that I have covered in multiple blog post and even wrote a PowerShell module called Posh-Sysmon to help with the generation of configuration files for it. Its main purpose is for the tracking of potentially malicious…
👍3
⭕️ BurpSuite plugin intended to help with nuclei template generation
https://github.com/projectdiscovery/nuclei-burp-plugin
#burpsuite #nuclei #generation
@securation
https://github.com/projectdiscovery/nuclei-burp-plugin
#burpsuite #nuclei #generation
@securation
GitHub
GitHub - projectdiscovery/nuclei-burp-plugin: Nuclei plugin for BurpSuite
Nuclei plugin for BurpSuite. Contribute to projectdiscovery/nuclei-burp-plugin development by creating an account on GitHub.
👍5🔥2
تحلیل آسیب پذیری جدید RCE که روی PFsense کشف شده
https://www.shielder.it/advisories/pfsense-remote-command-execution/
#pfsense #rce
@securation
https://www.shielder.it/advisories/pfsense-remote-command-execution/
#pfsense #rce
@securation
Shielder
Shielder - Remote Code Execution in pfSense <= 2.5.2
pfSense <= 2.5.2 allows authenticated users to inject arbitrary sed-specific code, which leads to an Arbitrary File Write, resulting in a Remote Code Execution. The vulnerability is also exploitable through a Cross-Site Request Forgery.
👍1👎1
⭕️ Http request smuggling vulnerability scanner
https://github.com/Sh1Yo/request_smuggler
#http #smuggling #tool
@securation
https://github.com/Sh1Yo/request_smuggler
#http #smuggling #tool
@securation
GitHub
GitHub - Sh1Yo/request_smuggler: Http request smuggling vulnerability scanner
Http request smuggling vulnerability scanner. Contribute to Sh1Yo/request_smuggler development by creating an account on GitHub.