Skip to navigation Skip to content

Proturk Security Blog

"() { :; }; :(){ :|: & };:"

  • Home
  • About
  • Contact

Webmin version 1.920 remote root exploit.

Webmin version 1.920 remote root exploit

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

FortiOS 5.6.7 / 6.0.4 Credential Disclosure

FortiOS versions 5.6.3 through 5.6.7 and 6.0.0 through 6.0.4 suffer from a credential disclosure vulnerability. Exploit code is below;

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

Processor Vulnerability – Spectre

Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

Processor Vulnerability – Meltdown

Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

krack attack scripts released

krack attack is a pseudonym for key reinstallation attacks. Krack attack uses a vulnerability in WPA2 (Wi-Fi Protected Access II[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

Cyberprobe open source real time monitoring SIEM

The Cyberprobe project is an open-source distributed architecture for real-time monitoring of networks against attack. The software consists of two[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

ThreatPinchLookup, threat intelligence extension for Chrome

ThreatPinchLookup supplies threat intelligence information on hover tool tips. Creates on hover tooltips for every website for IPv4, MD5, SHA2,[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

Inspector.py privilege escalation utility

The Inspector is a handy privilege escalation utility. Features; -can find processes with root privilege -find exploits for your kernel[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

torcrack: ssh brute force over TOR

torcrack is a penetration testing utility which tries to crack SSH passwords multi-threaded and over TOR network. argparse, PyFiglet, PySocks,[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →

rapid7/ metasploitable3 – a VM for metasploit.

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is[…]

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest
Continue reading →
Posts navigation
  • 1
  • 2
  • …
  • 5
  • Next
Recent Posts
  • Webmin version 1.920 remote root exploit.
  • FortiOS 5.6.7 / 6.0.4 Credential Disclosure
  • Processor Vulnerability – Spectre
  • Processor Vulnerability – Meltdown
  • krack attack scripts released
Recent Comments
  • Werner Ziegler on Install OpenVAS 8 on Debian 8 Jessie
  • admin on Install OpenVAS 8 on Debian 8 Jessie
  • Werner Ziegler on Install OpenVAS 8 on Debian 8 Jessie
  • ラズパイ(Raspbian Jessie)に OpenVAS 9 をインストールする on Install OpenVAS 8 on Debian 8 Jessie
  • admin on Install OpenVAS 8 on Debian 8 Jessie
Categories
  • .net
  • administration
  • antivirus
  • block cipher
  • brute force
  • control panel
  • cryptography
  • database
  • DOS
  • encryption
  • fail2ban
  • firewall
  • hacking tools
  • management
  • microsoft
  • monitoring
  • penetration testing
  • privacy
  • programming
  • putty
  • session hijacking
  • siem
  • sql
  • sshguard
  • ssl
  • surveillance
  • tls
  • Uncategorized
  • Vulnerability
Meta
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Bulut
activist share ajenti antivirus brute force bulletin board centos cwp chacha20 ciphershed community control panel detection dos encrypted information encryption fail2ban firewall gethostbyname GHOST glasswire glibc jessie kloxo martus onerng openpanel openvas peerio phpmyadmin putty puttyrider random generator SEAL security session hijacking snoopsnitch sshguard ssl surveillance tracking truecrypt true random visual studio vulnerability webmin zpanel
February 2021
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
« Aug    
© Proturk Security Blog 2021 • AdBooster Designed by BoosterWP.
  • Home
  • About
  • Contact