Jump to content

BiosHell

Active Members
  • Content Count

    323
  • Joined

  • Last visited

  • Days Won

    16

BiosHell last won the day on August 14

BiosHell had the most liked content!

Community Reputation

225 Excellent

8 Followers

About BiosHell

  • Rank
    Active Member

Recent Profile Visitors

2816 profile views
  1. BiosHell

    butthax

    the real "penetration testing"
  2. BiosHell

    Fun stuff

    https://i.imgur.com/FmDymVR.jpg
  3. BiosHell

    buna ziua

    Daca nu se mai inscriu retardati aici moare complet forumul
  4. A Google security researcher has just disclosed details of a 20-year-old unpatched high-severity vulnerability affecting all versions of Microsoft Windows, back from Windows XP to the latest Windows 10. The vulnerability resides in the way MSCTF clients and server communicate with each other, allowing even a low privileged or a sandboxed application to read and write data to a higher privileged application. MSCTF is a module in Text Services Framework (TSF) of the Windows operating system that manages things like input methods, keyboard layouts, text processing, and speech recognition. In a nutshell, when you log in to your Windows machine, it starts a CTF monitor service that works as a central authority to handle communications between all clients, which are actually windows for each process running on the same session. POC Link : https://github.com/taviso/ctftool Reference Link : https://thehackernews.com/2019/08/ctfmon-windows-vulnerabilities.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+(The+Hackers+News+-+Cyber+Security+Blog)&utm_content=FaceBook&fbclid=IwAR2P3wJ-iWLStzuyUoAnsIWVDojE7P-kyUJnnrX0tnOAN-c1DU7KGbDAGGM
  5. Esti si bou si nici nu esti in stare sa cauti in google, ceea ce este un beneficiu pentru cei ca tine. Maine apare postare...caut scan de vps...sau vps de scan Cum ti-au sugerat baietii si mai sus...pune mana si citeste o carte
  6. Discovered by Microsoft's security team itself, all four vulnerabilities, CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, and CVE-2019-1226, can be exploited by unauthenticated, remote attackers to take control of an affected computer system without requiring any user interaction. Just like BlueKeep RDP flaw, all four newly discovered vulnerabilities are also wormable and could be exploited by potential malware to propagate itself from one vulnerable computer to another automatically. Reference Link : https://thehackernews.com/2019/08/windows-rdp-wormable-flaws.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+(The+Hackers+News+-+Cyber+Security+Blog)&utm_content=FaceBook&fbclid=IwAR0gMT730nUergbtGRe7cdnTMT4KFVGAfc9hrxwr5oiRSTen8Vi3Amxm84I
  7. The below versions of FortiOS were vulnerable. FortiOS 5.6.3 to 5.6.7 FortiOS 6.0.0 to 6.0.4 ONLY if the SSL VPN service (web-mode or tunnel-mode) is enabled. Download Link: https://github.com/milo2012/CVE-2018-13379?fbclid=IwAR3KlBz15aRQkNYGSHVproriKQPXBFB9fBPnSjkMurySlbnSvvqBB1dV7pI
  8. SpaceCow - Python Rootkit Follow me on Twitter In the past days i spent a lot of time watching some RedTeam ops and I saw all these little tools making some awsome stuff... and in the 90% of the cases RedTeams don't share their tricks and softwares with others. So i thought I could create something open source. And after some days i crawled up with something... Acest script este doar pentru testing. Esti complet responsabil pentru ceea ce faci Download Link : https://github.com/TheSph1nx/SpaceCow?fbclid=IwAR0jCSepxcqcCNKv4gvhoxnVANO3YqndmuhX006-VKw1tunk2BINnF1DJQw
  9. e un poc pt dos ala pe care il stii tu asa vechi... aici este vorba de RCE
  10. Check Point Software Technologies issued a report today that detailed how its security researchers were able to remotely install malware on a digital DSLR camera. Ransomware has become a major threat to computer systems in recent years, as high-profile attacks have locked users out of personal computers, hospitals, city governments, and even The Weather Channel. Now, security researchers have discovered that another device that might be at risk: a DSLR camera. Check Point Software Technologies issued a report today that detailed how its security researchers were able to remotely install malware on a digital DSLR camera. In it, researcher Eyal Itkin found that a hacker can easily plant malware on a digital camera. He says that the standardized Picture Transfer Protocol is an ideal method for delivering malware: it’s unauthenticated and can be used with both Wi-Fi and USB. The report notes that individual with an infected Wi-Fi access point could deploy it at a tourist destination to pull off an attack, or infect a user’s PC. Reference Link : https://www.blackhatethicalhacking.com/dslr-cameras-vulnerable-to-ransomware-attack/
×
×
  • Create New...