Article on the subject of "exploiting vulnerabilities"
-
Metasploit - Tool to exploit vulnerabilities
the metasploit framework is an environment used to test, attack, and exploit service errors. metasploit is built from perl object-oriented language, with components written in c, assembler, and python. metasploit can run on most operating systems: linux, windows, macos.
-
Viber has successfully overcome the lock screen error on Android
according to viber, the company quickly released an update to fix lock screen errors on android phones.
-
Metasploit - Tool to exploit vulnerabilities
the metasploit framework is an environment used to test, attack, and exploit service errors. metasploit is built from perl object-oriented language, with components written in c, assembler, and python. metasploit can run on most operating systems: linux, windows, macos.
-
Hackers are using new Microsoft Office vulnerabilities to distribute malware
hackers are exploiting vulnerabilities in microsoft office software to spread a kind of sophisticated malware capable of stealing certificates, exploiting cryptocurrency and conducting denial of service (ddos) attacks.
-
Viruses exploiting bank account numbers appear
people who use online banking services should be cautious with new viruses appearing on windows that can steal account login information. known as a 'rootkit' on websites created for the purpose of exploiting vulnerabilities in the browser
-
Bulgaria: Getting urgent IT experts for revealing vulnerabilities in software
petko petrov - a famous it expert - was arrested on charges of arbitrarily exploiting and disclosing information about the security vulnerability of the software system used by local kindergartens.
-
Viber has successfully overcome the lock screen error on Android
according to viber, the company quickly released an update to fix lock screen errors on android phones.
-
Summary of popular network attacks today
for attacks by exploiting vulnerabilities, hackers must be aware of security issues on the operating system or software and take advantage of this knowledge to exploit vulnerabilities.
-
The Mail app on iOS has serious vulnerabilities
security researchers at zecops have discovered two serious vulnerabilities that exist on the default mail application pre-installed on millions of iphones and ipads.
-
Techniques of exploiting buffer overflow errors - Part II
in the previous section we have reviewed the memory organization, stack, calling the function to understand thoroughly why when the buffer overflow occurs, we can change the value of the command pointer register% eip, from which can execute any code. we also learned how to create a simple shellcode
-
The latest iOS 11 has been hacked !!!
security researchers competed together at mobile pwn2own 2017, exploiting vulnerabilities to hack ios 11 and executing the code.
-
Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
microsoft security researchers announced that they discovered more than two dozen serious remote code execution (rce) vulnerabilities related to internet of things (iot) and operational technology (ot) devices being used. relatively popular use today.
-
New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
an extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.
-
Microsoft found a security bug so powerful that it could shut down a power plant
microsoft has disclosed 15 critical vulnerabilities in its toolkit intended for industrial use. although exploiting this bug will be quite difficult, the risk of insecurity is very high, causing great damage to the targets.
-
Dynamics of Google, Apple and Microsoft when the browser has a security error
while apple and google urgently sought to patch security holes in safari (cve-2017-2419) and chrome (cve-2017-5033) browsers, microsoft did not notice. this security vulnerability was discovered by cisco talos researchers in safari, chrome, and edge browsers, but microsoft believes that this
-
HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
hp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
-
Security vulnerabilities - basic insights
software vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
-
Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
in the effort to protect users from meltdown and specter vulnerabilities, microsoft has decided to launch a 'bounty hunt' program with extremely lucrative expenses for anyone who finds new security flaws. and reveal them to microsoft.
-
Release software to check DNS server vulnerabilities
according to bach khoa network security center (bkis), dns cache poisoning vulnerabilities are placing dns server systems in vietnam as well as worldwide.
-
New malware targets Windows 64-bit
according to kaspersky lab, rootkit writers have begun exploiting a vulnerability to bypass patchguard protection built into 64-bit versions of windows.
-
EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
while ransomware wannacry has stirred up the internet world over the past few weeks to exploit only two vulnerabilities, the new malware uses seven vulnerabilities.
-
Four Windows vulnerabilities can be exploited in the perfect attack chain
the vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.