Monthly Archive: October 2017
+
Introduction Log files are the recoreds that Linux stores for administrators to keep track and monitor important events about the server, kernel, services and applications running …
By Win Stark
October 28, 2017
+
Apache-struts2 Content-Type arbitrary command execution (CVE-2017-5638) Apache Struts 2 is an open-source web application framework for developing Java EE web applications. It’s an extensible framework for …
By groot
October 27, 2017
+
Introduction Sometimes on a network it is benificial to know the Operating System(OS) of a machine. Accessing a system is easier when you know the OS …
By Win Stark
October 27, 2017
+
On October 24th we observed notifications of mass attacks with ransomware called Bad Rabbit. It has been targeting organizations and consumers, mostly in Russia but there …
By Cloudi
October 26, 2017
+
Overview Python Multi Threaded Tor Proxy Did you ever want to be at two different places at the same times ? While performing penetration tests there …
By Win Stark
October 25, 2017
+
As many people have read or will soon read, there is a vulnerability in the WPA2 wireless protocol called KRACK. An attacker within the wireless communications …
By Cloudi
October 18, 2017
+
Do you think your wireless network is secure because you’re using WPA2 encryption? If yes, think again! Mathy Vanhoef, a researcher from the University of Leuven …
By Cloudi
October 17, 2017
+
Hi guys! Today, I will introduce you a great platform. It is MISP – Malware Information Sharing Platform. Now let’s go! What is MISP? MISP, Malware …
By Cloudi
October 13, 2017