Skip to content
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

SECURITY

FIREWALK – Active Reconnaissance Network Security Tool

13 January 2018

Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device …

Tags Active, Network, Network Security, Tools

WINSpect-Powershell based Windows Security Auditing Toolbox

12 January 201812 January 2018

WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results …

Tags Auditing, Forensics, Windows Security

Android Application Penetration Testing – Part 11 – Android Checklist

11 January 201811 January 2018

Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to …

Tags Android, Application, Checklist, Google, Mobile Development, Penetration Testing

Cracking WPA/WPA2 Passwords in Minutes with Fluxion

8 January 20188 January 2018

Fluxion repack of LINSET with minor bugs and with added features. It’s compatible with latest Kali Linux, Rolling …

Tags Passwords, Wifi

How to hack Wi-Fi for fun and imprisonment with crypto-mining inject

5 January 20185 January 2018

Thanks to the ridiculous valuation of Bitcoin and other cryptocurrencies, cryptomining code has become a common mechanism for converting …

Tags How, Wi-Fi

SSL/TLS Certificate Revocation is Broken Time for More Reliable Revocation Checking Mechanism

3 January 20183 January 2018

We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Security researcher Scott Helme …

Tags Certificates, Cryptography, SSL, SSL/TLS, TLS

OWASP Dependency-Check Maven Plugin: A Must-Have

30 December 201730 December 2017

I have to admit, with a high degree of shame, that I didn’t know about the OWASP dependency check maven plugin. And seems to have been …

Tags OWASP, Plugins

Securing Your Inline SQL Statements From SQL Injection

29 December 201729 December 2017

At the beginning of any coder’s career, they build queries in code using strings. When you build strings in your code instead of on the …

Tags Databases, PHP, Programming, Programming Languages, Secure Coding, SQL, SQL Injection, Web Development

KickThemOut -Tools to Kick Devices out of Your Network and Enjoy all the Bandwidth

26 December 201726 December 2017

KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose particular or all …

Tags Bandwidth, Devices, Enjoy, Internet, Network

Here’s how to hack 40 websites in 7 minutes

25 December 201725 December 2017

Last summer I started learning about information security and hacking. Over the last year I’ve played in various wargames, capture the …

Tags Hacking, News

Sublist3r – Tool for Penetration testers to Enumerate Sub-domains

25 December 2017

Sublist3r a python based enumeration tool that enumerates subdomains of the domain using Google, Yahoo, Bing, Baidu, and Ask. It also …

Tags Domains, Tools

InSpy – Linkedin Information Gathering tool for Pentesters

23 December 201723 December 2017

The objective of this Information Gathering tool is to extract Linkedin users based on the organization, job description or email …

Tags Information, LinkedIn
Post navigation
Older posts
Newer posts
← Previous Page1 Page2 Page3 … Page7 Next →
Cookie-Free

NVD

CVE-2020-13134 – Tufin SecureChange prior to R19.3 HF3 and R20-1 HF1 are vulnerable to stored XSS. The succ …

20 January 2021

CVE-2020-20949 – Bleichenbacher’s attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware li …

20 January 2021

CVE-2021-1999 – Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component …

20 January 2021

CVE-2021-2016 – Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). …

20 January 2021

CVE-2021-2032 – Vulnerability in the MySQL Server product of Oracle MySQL (component: Information Schema). …

20 January 2021

CVE-2021-2049 – Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: A …

20 January 2021

EXPLOITS

Voting System 1.0 – File Upload RCE (Authenticated Remote Code Execution)

20 January 2021

Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 – Stored XSS

20 January 2021

ChurchRota 2.6.4 – RCE (Authenticated)

20 January 2021

osTicket 1.14.2 – SSRF

19 January 2021

Life Insurance Management System 1.0 – File Upload RCE (Authenticated)

18 January 2021

Life Insurance Management System 1.0 – ‘client_id’ SQL Injection

18 January 2021

SECURELIST

Sunburst backdoor – code overlaps with Kazuar

11 January 2021

Digital Footprint Intelligence Report

29 December 2020

How we protect our users against the Sunburst backdoor

23 December 2020

Lazarus covets COVID-19-related intelligence

23 December 2020

Sunburst: connecting the dots in the DNS requests

18 December 2020

The future of cyberconflicts

18 December 2020

Information Cyber Network Enterprise Security News

© 2021 GeekWire | Privacy Policy | Cookie-Free | We are not responsible for the content of external sites.