Released a public exploit (Local Privilege Escalation) for SMBv3 bug (CVE-2020-0796) Security News & Discussion |
- Released a public exploit (Local Privilege Escalation) for SMBv3 bug (CVE-2020-0796)
- Security Advisories: D-Link DSL-2640B (CVE-2020-9275, CVE-2020-9279, CVE-2020-9278, CVE-2020-9277 &CVE-2020-9276)
- "RDP to the Internet has grown significantly over the past month (41.5%)"
- Microsoft Windows and Apple macOS use predictable session IDs for the SMB v2/v3 protocols
- Bug bounties. Five Weeks To Your First Bug
- Exploiting Liferay CVE-2020-7961: A quick journey to PoC
- CVE-2020-8515: DrayTek pre-auth remote root RCE (PoC)
- They told me I could be anything, so I became a Kubernetes node – Using K3s for command and control on compromised Linux hosts
- C2Hack, sharing tips and tricks for pentesters
- Scanning JavaScript files for Endpoints and Secrets
- Skimming-as-a-Service: Anatomy of a Magecart Attack Toolkit
- Prototype pollution vulnerability in minimist npm package
- Understanding ASRep Roasting attack in Active Directory
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment