Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Jan 22, 2025Metasploit for Beginners — A Guide to the Powerful Exploitation FrameworkIf you’re starting your journey into penetration testing, you’ve likely heard of Metasploit. Metasploit is one of the most versatile tools in cybersecurity. It helps simplify vulnerability testing and exploitation. Metasploit helps us find and fix we...metasploit
FPT Metrodata IndonesiaforFPT Metrodata Indonesia Cyber Securitynews.fmisec.com·Jan 21, 2025Russian Botnet Exploits DNS Misconfiguration for Malware DeliverySummary Recently, Infoblox Threat Intelligence uncovered a botnet leveraging spam campaigns to deliver malware using spoofed sender domains. Unlike typical email spoofing techniques, this campaign exploits misconfigured DNS records to bypass email se...russian botnet
FPT Metrodata IndonesiaforFPT Metrodata Indonesia Cyber Securitynews.fmisec.com·Jan 21, 2025Criminals Exploit Advertiser Accounts Through Fake Google AdsSummary Researchers have recently discovered that cybercriminals are targeting individuals and businesses using Google Ads by phishing for their credentials through fraudulent ads. The scheme involves impersonating Google Ads, redirecting victims to ...fake ads
Harsimran Singhcybersimran.hashnode.dev·Jan 14, 2025Analyzing the Fortinet Firewall Zero-Day Vulnerability with MITRE ATT&CKIn late 2024, a critical zero-day vulnerability in Fortinet firewalls became the focal point of a sophisticated cyberattack campaign. Threat actors exploited exposed management interfaces of Fortinet devices to infiltrate networks, steal credentials,...Fortinet
Peter Gariaboutvirtualmachines.hashnode.dev·Dec 27, 2024Exploiting UnrealIRCd on Metasploitable 3's Port 6697This article will describe the process of hacking metasploitable 3 port 6697 using kali linux in a virtual lab environment. The lab environment is set up in Virtual Box. I have attached screenshots. The first step was to scan for vulnerabilities usin...unrealircd
Mohanraj Rbinarysouljour.me·Dec 5, 2024CVE-2024-46455 : XML eXternal Entity vulnerability in unstructured.io <= 0.14.2Before proceeding I would like to give a shoutout to my awesome friend and colleagueMohit Kwho tagged along in this journey and played a pivotal role. Summary This blog is a result of the applied vulnerability research that we did against open-webui...1 like·466 readsCVE
Auth0x78forGDSC NIT Silchar Blogblog.gdscnits.in·Nov 25, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...2 likes·279 readsBuffer Overfow
Rivanorthrivanorth.hashnode.dev·Nov 5, 2024Vulnerability Report: November 2024Welcome to the monthly Vulnerability Report. In this report, we provide an overview of the most significant security vulnerabilities identified in the past month. Our focus is on vulnerabilities that are being actively exploited, which pose the bigge...Security AdvisoryCVE
J3bitokjebitok.hashnode.dev·Oct 30, 2024Exploitation Basics: Metasploit: Exploitation (TryHackMe)In this article, I will write a write-up for Metasploit: Exploitation that covers the Scanning, The Metasploit Database, Vulnerability Scanning, Exploitation, and Msfvenom. I would be lying if I said going through this room was easy. I had to researc...1.1K readsmetasploit
Auth0x78auth0x78-blog.hashnode.dev·Oct 10, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...1 like·46 readsBuffer Overfow