Trending :
  • Webmin version 1.920 remote root exploit.
  • FortiOS 5.6.7 / 6.0.4 Credential Disclosure
  • Processor Vulnerability – Spectre
  • Processor Vulnerability – Meltdown
  • krack attack scripts released

Proturk Security Blog

"() { :; }; :(){ :|: & };:"

  • Home
  • About
  • Contact
  • Home
  • admin

Webmin version 1.920 remote root exploit.

August 21, 2019 adminVulnerabilityNo Comment on Webmin version 1.920 remote root exploit.

Webmin version 1.920 remote root exploit

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

FortiOS 5.6.7 / 6.0.4 Credential Disclosure

August 21, 2019August 21, 2019 adminUncategorizedNo Comment on FortiOS 5.6.7 / 6.0.4 Credential Disclosure

FortiOS versions 5.6.3 through 5.6.7 and 6.0.0 through 6.0.4 suffer from a credential disclosure vulnerability. Exploit code is below;

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

Processor Vulnerability – Spectre

January 5, 2018August 21, 2019 adminVulnerabilityNo Comment on Processor Vulnerability – Spectre

Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into…

Read More

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

Processor Vulnerability – Meltdown

January 5, 2018August 21, 2019 adminVulnerabilityNo Comment on Processor Vulnerability – Meltdown

Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access…

Read More

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

krack attack scripts released

November 14, 2017August 21, 2019 adminVulnerabilityNo Comment on krack attack scripts released

krack attack is a pseudonym for key reinstallation attacks. Krack attack uses a vulnerability in WPA2 (Wi-Fi Protected Access II…

Read More

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

Cyberprobe open source real time monitoring SIEM

January 11, 2017 adminmonitoring / siemNo Comment on Cyberprobe open source real time monitoring SIEM

The Cyberprobe project is an open-source distributed architecture for real-time monitoring of networks against attack. The software consists of two…

Read More

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

ThreatPinchLookup, threat intelligence extension for Chrome

January 9, 2017 adminadministration / VulnerabilityNo Comment on ThreatPinchLookup, threat intelligence extension for Chrome

ThreatPinchLookup supplies threat intelligence information on hover tool tips. Creates on hover tooltips for every website for IPv4, MD5, SHA2,…

Read More

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

Inspector.py privilege escalation utility

January 6, 2017 adminpenetration testingNo Comment on Inspector.py privilege escalation utility

The Inspector is a handy privilege escalation utility. Features; -can find processes with root privilege -find exploits for your kernel…

Read More

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

torcrack: ssh brute force over TOR

January 5, 2017 adminpenetration testingNo Comment on torcrack: ssh brute force over TOR

torcrack is a penetration testing utility which tries to crack SSH passwords multi-threaded and over TOR network. argparse, PyFiglet, PySocks,…

Read More

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

rapid7/ metasploitable3 – a VM for metasploit.

January 4, 2017 adminpenetration testing / VulnerabilityNo Comment on rapid7/ metasploitable3 – a VM for metasploit.

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is…

Read More

Share this:

  • Facebook
  • Reddit
  • LinkedIn
  • Twitter
  • Print
  • More
  • Pocket
  • Tumblr
  • Pinterest

Posts navigation

1 2 … 5 Next
Search for:

Recent Posts

  • Webmin version 1.920 remote root exploit.
  • FortiOS 5.6.7 / 6.0.4 Credential Disclosure
  • Processor Vulnerability – Spectre
  • Processor Vulnerability – Meltdown
  • krack attack scripts released

Recent Comments

  • Werner Ziegler on Install OpenVAS 8 on Debian 8 Jessie
  • admin on Install OpenVAS 8 on Debian 8 Jessie
  • Werner Ziegler on Install OpenVAS 8 on Debian 8 Jessie
  • ラズパイ(Raspbian Jessie)に OpenVAS 9 をインストールする on Install OpenVAS 8 on Debian 8 Jessie
  • admin on Install OpenVAS 8 on Debian 8 Jessie

Categories

  • .net
  • administration
  • antivirus
  • block cipher
  • brute force
  • control panel
  • cryptography
  • database
  • DOS
  • encryption
  • fail2ban
  • firewall
  • hacking tools
  • management
  • microsoft
  • monitoring
  • penetration testing
  • privacy
  • programming
  • putty
  • session hijacking
  • siem
  • sql
  • sshguard
  • ssl
  • surveillance
  • tls
  • Uncategorized
  • Vulnerability

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Bulut

activist share ajenti antivirus brute force bulletin board centos cwp chacha20 ciphershed community control panel detection dos encrypted information encryption fail2ban firewall gethostbyname GHOST glasswire glibc jessie kloxo martus onerng openpanel openvas peerio phpmyadmin putty puttyrider random generator SEAL security session hijacking snoopsnitch sshguard ssl surveillance tracking truecrypt true random visual studio vulnerability webmin zpanel
April 2021
M T W T F S S
 1234
567891011
12131415161718
19202122232425
2627282930  
« Aug    
Copyright © All rights reserved.
PT Magazine by ProDesigns