HagalazAI/CyberDolphin-2.9.3-mistral-nemo-12b
Text Generation • 12B • Updated • 30 • 1
content stringlengths 196 523k |
|---|
Exploit.SunOS.snamp.a is an exploit released by the Last Stage of Delirium (LSD) in 2001. The CVE number for the vulnerability it exploits is: CVE-2001-0236. It exploits a heap overflow vulnerability in an RPC service, resulting in unauthorized root access. This tool, in itself, won't run automatically; it has to be la... |
The right way to send a secret message to anyone, understanding the basics of 3 pass protocol
Major giveaway of a certied penetration testing or hacker training worth Rs.30,000 or $410 on the occasion of our 1 year anniversary. Particiapte now!!
This post is a walkthrough of the PickleRick which is a Rick and Morty the... |
A new variant of the Bagle worm that turns off antivirus and personal firewalls is likely to spread rapidly, warn antivirus experts. Organizations blocking the .exe, .scr, .com and .cpl extensions significantly reduce their risk of infection to this worm, as well as many others.
W32/Bagle-AS@mm spreads via e-mail and p... |
Today, we worked, with the help of ioerror on IRC, on reducing the attack surface in our fetcher methods.
There are three things that we looked at:
- Reducing privileges by setting a new user and group
- seccomp-bpf sandbox
Today, we implemented the first of them. Starting with 1.1~exp3, the APT directories /var/cache/... |
No description provided by source.
source: http://www.securityfocus.com/bid/1035/info A vulnerability exists in the installation program for Oracle 8.1.5i. The Oracle installation scripts will create a directory named /tmp/orainstall, owned by oracle:dba, mode 711. Inside of this directory it will create a shell script... |
The U.S. Cybersecurity and Infrastructure Security Agency published an advisory to warn of the discovery of a crypto-mining malware in the popular NPM Package UAParser.js. The popular library has million of weekly downloads.
“Versions of a popular NPM package named
ua-parser-js was found to contain malicious code.
ua-p... |
# PoC for CVE-2023-23333 (solarView-Compact)
This script checks if an IP address is vulnerable to CVE-2023-23333. It utilizes the `curl` command to execute a specific command on the target device and capture the output. If the IP address is vulnerable, it displays the output and saves the full output to a file.
- Pytho... |
Hello want your help with assignment please
write a summary of the readings to be uploaded one and a half single-spaced pages (approximately 900 words).
must be prepared to lead the discussion for that class.
Content of the oral and written assignment will consist of
1) a brief summary of the key
points of the readings... |
How many times that we who work at the SOC find that it’s damn hard to validate an incident? Let say that we received one alerts; WEB-PHP remote include path (my fav),
1st let us see the rules. This is to know how the hell the alert triggered;
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:”WEB-PHP remot... |
The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules include... |
ChatGPT: Using artificial intelligence for the next exploit?
by Tina Siering
How cybercriminals are already utilising ChatGPT today
Artificial intelligence (AI) has been used to programme malicious code before. With ChatGPT, however, cyber criminals without much programming knowledge are now able to develop malware. Th... |
By gaining access to the vehicles, hackers can not only locate them but also open their doors and even turn off the engine while the owner is driving.
Two popular car alarm companies are facing problems with their products. Viper and Pandora are famous for their alarms that cost thousands of dollars, and promise greate... |
Sealioning (also spelled sea-lioning and sea lioning ) is a type of trolling or harassment which consists of pursuing people with persistent requests for evidence or repeated questions, while maintaining a pretense of civility. It may take the form of "incessant, bad-faith invitations to engage in debate." The trol... |
- OceanLotus is believed to be a Vietnam-linked cyberespionage group that targets organizations across multiple sectors.
- The packet sniffing feature of Ratsnif trojan focuses on extracting login credentials and other sensitive data via protocol parsing.
OceanLotus APT group, also known as APT32, SeaLotus, and CobaltK... |
Generally, attacks of ransomware are directed at selected and unique targets. But last weekend, the group REvil (or Sodinokibi) managed to claim hundreds of victims, perhaps thousands, in various parts of the world. To do this, hackers exploited a vulnerability in a system from the Kaseya, a company that provides IT se... |
The mass adoption of AI-powered systems has motivated re-examination of the reliability, privacy, and security of AI algorithms. With respect to security, it was discovered early on that image based AI algorithms are vulnerable to a class of adversarial evasion attacks [szegedy2014intriguing, goodfellow2014explaining].... |
This attack could pose a moderate security threat. It does not require immediate action.
This signature detects attempts to exploit a denial-of-service vulnerability in Xerver.
Xerver is a freely available Web server, written in Java. It will run on any operating system with Java installed, including Microsoft Windows,... |
- Vital information on this issue
- Scanning For and Finding Vulnerabilities in Chargen Detection
- Penetration Testing (Pentest) for this Vulnerability
- Security updates on Vulnerabilities in Chargen Detection
- Disclosures related to Vulnerabilities in Chargen Detection
- Confirming the Presence of Vulnerabilities i... |
A Java library for executing, parsing and persisting NMap output.
Nmap4j is good! Thanks.
Very useful API to parse into Java objects nmap's output. After the parsing, you can iterate over the NMapRun object to extract hosts, MAC-address, IP-address, services, ports, OS, and all other information caught by nmap. There a... |
China-Linked Hackers Used UEFI Malware in North Korea-Themed Attacks
A threat actor linked to China has used UEFI malware based on code from Hacking Team in attacks aimed at organizations with an interest in North Korea, Kaspersky reported on Monday.
Kaspersky researchers analyzed the malware and the malicious activity... |
New York (CNN Business)Microsoft is urging Windows users to immediately install an update after security researchers found a serious vulnerability in the operating system.
The security flaw, known as PrintNightmare, affects the Windows Print Spooler service. Researchers at cybersecurity company Sangfor accidentally pub... |
Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Com... |
The U.S. authorities has warned that North Korean state-backed hackers generally known as the Lazarus Group are concentrating on organizations within the blockchain business utilizing trojanized cryptocurrency functions.
In a joint advisory issued on Monday, the FBI, CISA and the U.S. Treasury stated they’d noticed the... |
Today, we’re going to take a look at some of the top tools in the game that can help you identify vulnerabilities, exploit weaknesses, and gain access to a target system. These tools are the ultimate weapons in a hacker’s arsenal and can help you become the next cyber ninja. So, let’s get hacking
1. Burp Suite
This too... |
Thankfully, it's relatively easy -- and free -- to protect your computer from bad rabbit ransomware. By simply tweaking a couple of files, you can stop the ransomware in its tracks. all you need to do is create two files (c:\windows\infpub.dat and c:\windows\cscc.dat) and remove all permissions from them. This means th... |
An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn’t protected against re-ordered reads, and may hence end up... |
Have you ever heard of IIS malware? It’s not a common term that most people are familiar with, but it is not new. Cybercriminals have been exploiting the IIS web server software for Windows since 2013. Now, IIS backdoors are being deployed via the recent Microsoft Exchange pre-authentication Remote Code Execution (RCE)... |
A few days ago, there were reports of Verizon’s database being held hostage by a hacker. Now, it looks like T-Mobile is being targeted by an aggressive phishing scam.
To be more specific, the attack is targeting T-Mo employees. As reported by The T-Mo Report, employees shared that they are receiving texts with fake mes... |
DDoSPedia is a glossary that focuses on network and
application security terms with many distributed
definitions. It provides a central place for hard to find web-scattered
definitions on DDoS attacks.
DNS amplification attack is a sophisticated
denial of service attack
that takes advantage of DNS servers' behavior in ... |
Format string vulnerability in the log_message function in lks.c in
Linux Kiss Server 1.2, when background (daemon) mode is disabled,
allows remote attackers to cause a denial of service (crash) or
execute arbitrary code via format string specifiers in an invalid
Note:References are provided for the convenience of the ... |
Vulnerable servers of all kinds are being targeted, compromised and made to mine cryptocurrencies for the attackers.
Apache Solr servers under attack
SANS ISC handler Renato Marihno warns about an active campaign aimed at compromising Apache Solr servers. The campaign infected 1777 victims from February 28 to March 8. ... |
29 January 2020
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0320 FortiOS SSL VPN user credential plaintext storage 29 January 2020 =========... |
During a press conference on election security at FBI Headquarters with FBI Director Christopher Wray, Director of National Intelligence John Ratcliffe confirmed that some voter registration information has been obtained by Iran, and separately, by Russia.
"This data can be used by foreign actors to attempt to communic... |
Browsers are usually the first point of contact between victims and threat actors. With a few bits of code, crooks manage once again to freeze Google Chrome and scare users into calling for assistance.
Two new extensions in Firefox and Chrome force install then hide from the user. Learn how you can protect yourself aga... |
The government of Bangladesh has been targeted more than once by Bitter, an APT group that focuses on cyberespionage. It has developed a new malware that enables it to download and execute remote files.
A typical example of Bitter’s targeting scope, which has not changed since 2013, is the campaign, which has been ongo... |
Naked web cam chat on skype dating customs in cyprus
Other popular uses include security surveillance, computer vision, video broadcasting, and for recording social videos.
The video streams provided by webcams can be used for a number of purposes, each using appropriate software: Most modern webcams are capable of cap... |
This post is also available in: 日本語 (Japanese)
In September 2019, during the proactive IoT threat-hunting process conducted daily by the Unit 42 (formerly Zingbox security research) team, we discovered an updated Gafgyt variant attempting to infect IoT devices; specifically small office/home wireless routers of known c... |
Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered by prolific researcher bashis.
Most importantly, it shows supply chain risks with so many sharing the same fundamental software/hardware.
Inside, we report details on:
- Vu... |
Iranian and Russian hackers use spear-phishing to target UK politicians
Iranian and Russian hacking groups are utilizing spear-phishing campaigns against British politicians, journalists, and activists, the UK National Cyber Security Centre (NCSC) warned.
The cyber war is in full swing, with nation-states deploying bot... |
Asked by: Ibor Hinspetertechnology and computing email
What tools could you use to perform port scanning?
Last Updated: 10th February, 2020
- Nmap. Nmap stands for "Network Mapper", it is the most popular network discovery and port scanner in the history.
- Unicornscan. Unicornscan is the second most popular free port ... |
Cybercriminals send phishing emails disguised as Microsoft to gain access to victims’ login credentials. Once they have access, the attackers can carry out further attacks or steal sensitive information.
Users should be cautious of unsolicited emails, verify the sender’s identity before entering login credentials, and ... |
IBM Security Information Queue (ISIQ) stores the JSON web token (JWT) secret in plain text in one of its YAML files. As of v1.0.5, ISIQ generates an encrypted JWT secret during product configuration.
DESCRIPTION: IBM Security Information Queue (ISIQ) contains hard-coded credentials, such as a password or cryptographic ... |
DescriptionDirectory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash),... |
There are no ActiveX viruses known to us at the moment. However, this is likely to change in the future.
There are some known and potentially dangerous OCX ActiveX applets out there, but no viruses.
One example is OCX.Exploder, an applet that shuts down Windows. This applet is no longer detected by FSAV since it can be... |
The first step in vulnerability assessment is to define the scope (“Pre-engagement,” n.d.). After the scope is defined, the next step is information gathering, which defines the intelligence gathering activities of a vulnerability test. Depending on the scope of the engagement, there are many aspects to performing reco... |
In this post, I am going to do the walkthrough of the machine hacksudo FOG from Vulnhub by Vishal Waghmare.
Machine Link: https://www.vulnhub.com/entry/hacksudo-fog,697/
I began with netdiscover and then nmap.
sudo netdiscover -i eth0 -r 10.0.2.1/24
nmap -v -T4 -p- -sC -sV --min-rate=1000 10.0.2.17
So, I we have telnet... |
U.S. government cybersecurity experts are providing guidance on the “top 10” most commonly exploited vulnerabilites. The alert helps highlight the importance of patching and prioritizing vulnerabilities with known exploits.
Security experts discovered LokiBot, a trojan malware, has been impersonating a popular game lau... |
By Prasun Howli, Samit Khare, Kathryn Rock
On May 17, 2022, the cybersecurity authorities1 of the United States, Canada, the Netherlands, New Zealand, and the UK published a joint cybersecurity advisory titled, “Weak Security Controls and Practices Routinely Exploited for Initial Access.”2 The advisory highlights the c... |
New malware responsible for infecting MMO game developers and stealing third-party virtual currencies through a malicious application has been detected by the Slovak security company ESET. The unprecedented action was attributed to Winnti, a group of hackers that has been operating since 2009, responsible for hundreds ... |
Even though the holidays are over in many countries, it has been a very quiet week for ransomware. Unfortunately, ransomware activity will likely pick up shortly.
We also had victims, such as Dassault Jet and TransLink, disclosing data breaches after ransomware attacks earlier this year. Other than that, it was your st... |
8. The secret for a better Wi-Fi
One of the first things we do when moving to a new place – some of us even do it before decorating – is setting up the Wi-Fi. Hooking up those wireless internet routers seems easy enough, and most of us do it by ourselves, but there’s one thing we aren’t aware of: it’s always advised to... |
Remove http://en.v9.com infection from your Windows PC / Laptop
http://en.v9.com is categorized as risky browser hijacker which installed unknowingly. It propagates easily when one visits malicious websites. This browser hijacker replace your homepage without any information. It looks like a normal websites but in real... |
1. EXECUTIVE SUMMARY
- CVSS v3 6.3
- ATTENTION: Low attack complexity
- Vendor: EnOcean Edge Inc, a subsidiary of EnOcean GmbH
- Equipment: SmartServer with i.LON Vision
- Vulnerability: Use of Hard-coded Credentials
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to gain unauth... |
New ATM malware stock dubbed fix has been observed targeting Mexican banks since early February 2023.
“ATM malware is hidden inside another seemingly harmless program,” says Latin American cybersecurity firm Metabase Q. Said In a report shared with The Hacker News.
Windows-based ATM malware not only requires interactio... |
A worm is a malicious computer program that infects a host computer, replicates itself, and uses computer networks, including the Internet, to infect other computers.
Worms are differentiated from other malicious computer programs by the fact that they spread on their own without the use of a host file. The fact that t... |
Over 90 recipes to execute many of the best known and little known penetration-testing aspects of BackTrack 5 with this book and ebook.
Learn to perform penetration tests with BackTrack 5
Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
Provides detailed step-... |
A filtered subset of trendmicro-ailab/Primus-FineWeb, containing red-team / offensive security text.
Trend_Primus_FineWeb-Red consists of texts specifically related to offensive cybersecurity and penetration testing topics, such as exploit development, attack methodologies, vulnerability scanning, payload creation, and command-and-control (C2) frameworks, etc..
This dataset was created by filtering offensive cybersecurity content using the RedSecureBERT model. It's intended primarily for training and evaluating offensive-security-oriented cybersecurity models.
This dataset is released under the ODC-By-1.0 license.
Source: trendmicro-ailab/Primus-FineWeb, HuggingFaceFW/fineweb
Requirements: