Content curation / Veille informationnelle


    Feed has no items.

    Feed has no items.

Hacking Articles Raj Chandel's Blog

  • Wireless Penetration Testing: Fern
    par Raj Chandel le 14 juin 2021 à 10 h 26 min

    Fern is a python based Wi-Fi cracker tool used for security auditing purposes. The program is able to crack and recover WEP/WPA/WPS keys and also run other network-based attacks on wireless or ethernet based networks. The tool is available both as open source and a premium model of the free The post Wireless Penetration Testing: Fern appeared first on Hacking Articles.

  • Luanne HackTheBox Walkthrough
    par Raj Chandel le 12 juin 2021 à 17 h 14 min

    Today we are going to crack a machine called the Luanne. It was created by polarbearer. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking! Penetration Testing Methodology Network Scanning Nmap Scan Enumeration Enumerating HTTP Service Directory Bruteforce using Gobuster Fuzzing The post Luanne HackTheBox Walkthrough appeared first on Hacking Articles.

  • Remote Desktop Penetration Testing (Port 3389)
    par Raj Chandel le 12 juin 2021 à 12 h 04 min

    In this article, we are discussing Remote Desktop penetration testing in four scenarios. Through that, we are trying to explain how an attacker can breach security in a different- different scenario and what types of the major step should take by admin while activating RDP services to resist against attack. The post Remote Desktop Penetration Testing (Port 3389) appeared first on Hacking Articles.

RSS - Actualité CNIL.fr Fil RSS des actualités de la Commission Nationale de L'Informatique et des Libertés (CNIL)


Internet Society Working for an Internet that is open, globally connected, and secure.

  • Successful Strategies for Building and Growing IXPs
    par Naveed Haq le 15 juin 2021 à 13 h 10 min

    Insights from a comparative study launched today To bring faster, affordable, and resilient connectivity to people, local Internet stakeholders often turn to Internet exchange points (IXPs). They’re a critical digital infrastructure where networks come together to connect and exchange Internet traffic. IXPs help keep domestic Internet traffic local, reducing transit costs, lag time, and providing The post Successful Strategies for Building and Growing IXPs appeared first on Internet Society.

  • The Week in Internet News: Twitter Deletes Tweet, Nigeria Bans the Whole Platform
    par Grant Gross le 14 juin 2021 à 13 h 00 min

    No more tweets: After Twitter removed a tweet by Nigerian President Muhammadu Buhari, the federal government there banned the platform, at least temporarily, because of “the persistent use of the platform for activities that are capable of undermining Nigeria’s corporate existence,” DW.com reports. Some Nigerians are tweeting anyway, but they risk arrest for doing so, The post The Week in Internet News: Twitter Deletes Tweet, Nigeria Bans the Whole Platform appeared first on Internet Society.

  • In Central Asia: Experts Discuss Opportunities to Grow IXPs
    par Israel Nyoh le 11 juin 2021 à 18 h 13 min

    When the Internet Society, Asian Development Bank, and the United Nations Economic and Social Commission for Asia and the Pacific examined the regional digital economy of Central Asia in 2015, it recommended investing in the development of Carrier-Neutral Internet Exchange Points (IXPs) to drive down connectivity costs and enable more people to connect on the The post In Central Asia: Experts Discuss Opportunities to Grow IXPs appeared first on Internet Society.


Security.NL maakt Nederland veilig Security.NL maakt Nederland veilig


Naked Security Computer Security News, Advice and Research


Security Weekly Security Market Validation

  • Cryptocurrency: Cybercrime’s New Favorite Tool
    par Adrian Sanabria le 1 juin 2021 à 22 h 45 min

    While 2021 will, unfortunately, play host to a wide variety of threats, it’s unlikely any factor will feature more prominently than cryptocurrency. Two types of attacks leverage cryptocurrency directly: extortion and cryptojacking. Before cryptocurrency, cybercriminals worked a lot harder to get paid a lot less. Turning stolen personal information or credit cards into a paycheck The post Cryptocurrency: Cybercrime’s New Favorite Tool appeared first on Security Weekly.

  • Delivering on the Promise of Application Security in the Cloud
    par Matt Alderman le 10 mai 2021 à 21 h 28 min

    Application security has become a complex, distributed problem.  During the days of waterfall development and monolithic applications, application security was pretty straight forward – statically scan your source code, dynamically test your business logic, and deploy a web application firewall to protect layer 7 traffic.  But with agile development, DevOps processes, and containerized applications, application The post Delivering on the Promise of Application Security in the Cloud appeared first on Security Weekly.

  • How Cloud Defenders Thwart Attacks Against Resilient Services
    par Matt Alderman le 4 mai 2021 à 13 h 35 min

    The introduction of containers and micro-service architectures have changed the way we develop, deploy, and run our applications.  Not only has this changed application development, but it’s also created some visibility challenges for application security.  Move those applications to the cloud and we only amplify those challenges.  How do we architect our cloud services and The post How Cloud Defenders Thwart Attacks Against Resilient Services appeared first on Security Weekly.


  • Hello world!
    par liquidmatrix le 28 novembre 2015 à 23 h 35 min

    Welcome to WordPress. This is your first post. Edit or delete it, then start writing!


  • Blind ROP ARM - ECSC Préquals 2019 - Secure Vault - Writeup
    par Geluchat le 22 mai 2019 à 16 h 00 min

    Dans le cadre des préqualifications de l'ECSC, j'ai eu l'occasion de tester un challenge original dans la catégorie pwn : le challenge Secure Vault. La mention "aucun binaire n'est fourni avec ce challenge" nous indique que le challenge va être intéressant ! Pour commencer, on se connecte au challenge : root@Miaou:/# nc …

  • Exploitation d'un programme 64 bits sous Windows 10
    par Geluchat le 15 mai 2018 à 12 h 30 min

    Introduction Lorsque l'on débute dans le domaine de l'exploitation de binaire, notre choix se tourne le plus souvent vers Linux. En effet, beaucoup de challenges ont été développés sous Linux et la documentation sur l'exploitation Linux ne manque pas. Néanmoins, créer des exploits pour Linux n'a pas le même impact …

  • Les Server Side Request Forgery : Comment contourner un pare-feu
    par Geluchat le 15 septembre 2017 à 22 h 40 min

    Qu'est ce que les Server Side Request Forgery ? Les Server Side Request Forgery, ou en abrégé SSRF, sont des vulnérabilités Web permettant de lire des fichiers sur le serveur local. Il ne faut pas les confondre avec les CSRF (Cross Site Request Forgery), qui, elles, ont pour but l'exécution d'une …


IT Security Guru The Site for our Community

  • AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks
    par The Gurus le 15 juin 2021 à 15 h 41 min

    AT&T Cybersecurity has today announced that its new Secure Access Service Edge (SASE) offering now includes Palo Alto Networks. AT&T SASE is an integrated solution that combines Palo Alto Networks software-defined wide area networking (SD-WAN) technology, security capabilities and fiber-based network connectivity in a completely managed solution.    The comprehensive solution, with expertise in design The post AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks appeared first on IT Security Guru.

  • CyberSmart Disrupts SME Cybersecurity with $10 million Series A Funding
    par The Gurus le 15 juin 2021 à 15 h 26 min

    CyberSmart has today announced the completion of a successful over-subscribed Series A funding round, bringing the total raised to over $10 million. Alongside deeptech fund IQ Capital and with the additional support of InsurTech specialist, Eos Venture Partners, and data science focused Winton Ventures, CyberSmart is set to further disrupt the cybersecurity market. The funding The post CyberSmart Disrupts SME Cybersecurity with $10 million Series A Funding appeared first on IT Security Guru.

  • Ransomware will cost its victims more around $265 billion (USD) annually by 2031, Cybersecurity Ventures predicts
    par The Gurus le 11 juin 2021 à 15 h 56 min

    According to a report published by Cybersecurity Ventures, ransomware payments are predicted to cost victims over $265 billion by 2031. This isn’t difficult to imagine, given the recent streak of high-profile attacks, some of which caused a ripple effect that reflected on consumers finding themselves having to pay more for gas and finding heftier price The post Ransomware will cost its victims more around $265 billion (USD) annually by 2031, Cybersecurity Ventures predicts appeared first on IT Security Guru.


    Feed has no items.

    Feed has no items.

CERT-FR Centre gouvernemental de veille, d'alerte et de réponse aux attaques informatiques