|
EVIR Gibson posted:I found a Cisco device where, without any creds on the login page, could run commands on the server, as root, through the password field. Which device?
|
# ¿ Mar 3, 2016 04:07 |
|
|
# ¿ May 5, 2024 18:24 |
|
I was gonna seriouspost about the OSCP but this page is
|
# ¿ Mar 29, 2016 06:07 |
|
Mustache Ride posted:Jesus tapdancing christ, why is everyone so loving angry in these threads? Infosec Internet Discussions: 75% "How hack girlfrindz facebook????" 10% "12 year old copy-pasting old 'zine articles about wardialing and acting smug and/or charlatans" 10% "Adults with jobs comparing internet dicks" 2.5% "We made a logo and a name for some real stupid non-exploitable bug to make our resume's look cooler p.s. please hire us" 2.5% "Actual good information and discussion" invision fucked around with this message at 20:32 on May 1, 2016 |
# ¿ May 1, 2016 20:23 |
|
OSI bean dip posted:You forgot to add charlatans somewhere in that list. fixed.
|
# ¿ May 1, 2016 20:32 |
|
Anyways, back on track: If ya'll haven't done OSCP, you're missing out on a stupidly fun time.
|
# ¿ May 1, 2016 21:41 |
|
Subjunctive posted:Yeah, I wrote software that handled all the data on some classified clusters as a foreign national without a background check. The parameters of gov't contracting are broad and varied. Were you like sub-sub-sub-sub-contracted?
|
# ¿ May 2, 2016 00:59 |
|
thread.mp4 https://www.youtube.com/watch?v=bKgf5PaBzyg /server irc.synirc.org /join #infosec invision fucked around with this message at 03:16 on May 2, 2016 |
# ¿ May 2, 2016 03:07 |
|
Daman posted:nobody is targeting grandma for an AV RCE that requires a mitm. Jokes on you, I'm from MawMawSec - make all my money getting grandma boxes and selling their AOL account information on underground forumz.
|
# ¿ May 2, 2016 18:05 |
|
|
# ¿ May 5, 2024 18:24 |
|
https://en.wikipedia.org/wiki/Stagefright_(bug) e:fb On October 1st, 2015, Zimperium released details of further vulnerabilities, also known as Stagefright 2.0. This vulnerability affects specially crafted MP3 and MP4 files that execute their payload when played using the Android Media server. The vulnerability has been assigned identifier CVE-2015-6602 and was found in a core Android library called libutils; a component of Android that has existed since Android was first released. Android 1.5 through 5.1 are vulnerable to this new attack and it is estimated that one billion devices are affected.[25]
|
# ¿ May 3, 2016 22:56 |