サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
コーヒー沼
infosecwriteups.com
1) TORBOT This tool is an OSINT resource designed specifically for the dark web. Crafted using Python, its primary aim is to systematically gather comprehensive information using data mining algorithms. Its capabilities extend to meticulous data retrieval and the generation of a tree graph, enabling in-depth exploration. Operating as an Onion Crawler (.onion), it extracts page titles, site address
Greetings to the reader, I hope you are doing well. Today I want to talk about one of my findings in a private program at Hacker-One platform, which refers to it as target.com. Firstly:Following some reconnaissance and effort, I found target.com, I create an account on it and tried to understand the application and its functionalities in it. I tried to test a lot of things, but I was unable to ide
My journey on finding and reporting databases with sensitive data about Fortune-500 companies, Hospitals, Crypto platforms, Startups during due diligence, and more. Table Of Contents OverviewBackgroundMy HypothesisScanningBI & Automation: From thousands to hundredsExamples of data I foundConclusionOverviewIt is easy to find misconfigured assets on cloud services, by scanning the CIDR blocks (IP ra
We’ve been in this pandemic since March and once the pandemic started I was having plenty of free time, And I need to use that time wisely, So I’ve decided to take the OSWE certification and I finished the exam on 8 of August, after that, I took a couple of weeks to recover from the OSWE exam, then in the med of September, I said you know what? I did not register my name in the Facebook hall of fa
Hacking is to identify weaknesses in computer systems or networks to exploit its vulnerabilities and gaining access. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate-personal data, etc. Cybercrimes cost many companies millions of dollars every year. Businesses need to protect themselves against such attacks. On the other hand, Python is a
This article is a continuation of my previous write-up “Malware Analysis 101- Basic Static Analysis”, do give it a read before going ahead with this one to have a better understanding of the things that I will be explaining here. I wrote my previous article on Basic Static Analysis of malware and the next article I had in mind was the Basic Dynamic Analysis of malware. Before I start with the dyna
CVE-NumbersDOS Vulnerability — Fixed in Client version 4.4.2 — CVE-2019–13449Information Disclosure (Webcam) — Unfixed —CVE-2019–13450UPDATE — July 9th (am)As far as I can tell this vulnerability also impacts Ringcentral. Ringcentral for their web conference system is a white labeled Zoom system. UPDATE — July 9th (pm)According to Zoom, they will have a fix shipped by midnight tonight pacific time
このページを最初にブックマークしてみませんか?
『InfoSec Write-ups』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く