Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 10/06/17 in all areas

  1. What is the main purpose of security.txt? The main purpose of security.txt is to help make things easier for companies and security researchers when trying to secure platforms. Thanks to security.txt, security researchers can easily get in touch with companies about security issues. https://securitytxt.org/ https://github.com/securitytxt/securitytxt.org/ The idea of EdOverflow.
    2 points
  2. Key Features Presents a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators Systematically introduces malware diffusion processes, providing the relevant mathematical background Discusses malware modeling frameworks and how to apply them to complex wireless networks Provides guidelines and directions for extending the corresponding theories in other application domains, demonstrating such possibility by using application models in information dissemination scenarios Readership Graduate students, postdoctoral researchers, professors and experienced/interested engineers involved in computer security/malware research Download: aHR0cHM6Ly93ZS50bC9LempBcFNiYWdF Buy: https://www.elsevier.com/books/malware-diffusion-models-for-modern-complex-networks/karyotis/978-0-12-802714-1
    2 points
  3. The Apache Tomcat team has recently patched several security vulnerabilities in Apache Tomcat, one of which could allow an unauthorised attacker to execute malicious code on affected servers remotely. Apache Tomcat, developed by the Apache Software Foundation (ASF), is an open source web server and servlet system, which uses several Java EE specifications like Java Servlet, JavaServer Pages (JSP), Expression Language, and WebSocket, and provides a "pure Java" HTTP web server environment for Java concept to run in. Unlike Apache Struts2 vulnerabilities, which have recently been exploited to breach the systems of American credit reporting agency Equifax, Apache Tomcat flaws are less likely to be exploited. The critical Remote Code Execution (RCE) vulnerability (CVE-2017-12617) discovered in Apache Tomcat is due to insufficient validation of user-supplied input by the affected software. Only systems with HTTP PUTs enabled (via setting the "read-only" initialization parameter of the Default servlet to "false") are affected. Exploiting this vulnerability requires an attacker to upload a maliciously crafted Java Server Page (JSP) file to a targeted server running an affected version of Apache Tomcat, and the code contained in the JSP file would be executed by the server when the file is requested. To upload the maliciously crafted JSP, the attacker just needs to send an HTTP PUT request to the vulnerable server, as mentioned in the proof-of-concept (PoC) exploit code published by Peter on the Apache mailing list. The exploit would eventually allow the attacker to execute malicious code on the targeted server. This RCE vulnerability, marked as "important," impacts all Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81, and has been addressed with the release of Tomcat versions 9.0.1 (Beta), 8.5.23, 8.0.47 and 7.0.82. A similar security issue (CVE-2017-12615) discovered in Tomcat 7 on Windows was patched by the Apache Tomcat developers on September 19 with the release of version 7.0.81. Administrators are strongly recommended to apply the software updates as soon as possible and are advised to allow only trusted users to have network access as well as monitor affected systems. The researchers have not detected any incident of the exploitation of one of these Apache Tomcat vulnerabilities in the wild. Source: thehackernews.com
    1 point
  4. :))))))))))) De ce cacat ai modificat ma omule sursa, sa-ti apara pupaceii tai acolo si cu nickname-ul sa zica lumea ca esti hackeri ? Si packet size de ce sfantul sloboz l-ai pus 45, ai 10gbps cumva ? Nu mai bine trimiti pachete de 10 bytes cu viteza mai mare ? Acum vrei sa-l matrasesti sa nu mai modifice alt hacker celebru ca tine cu "Flood by Giuberica din dealul spirei" si "Arunc cacatul peste gardul fraierului la exemplu.com port 80", ahahahahahha. Vai de steaua voastra.
    1 point
  5. Am încredere că faci minunat. Puteți configura un server dedicat pentru mine și instala un e-mail în el.
    -1 points
  6. Am încredere că faci minunat. Puteți configura un server dedicat pentru mine și instala un e-mail în el.
    -2 points
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...