Electronic Data Processing POLAND
Ethical Hacking, Pentest, Computer Forensics, Security

Najnowsze wpisy

How Kali deals with the upcoming Python 2 End-of-Life

Five years ago, the Python developers announced that they will stop supporting Python 2 in 2020. For a long time, nobody cared and Python 3 adoption was slow. But things have changed a lot lately as the deadline is right around the corner (1st January). Read more: https://www.kali.org/news/python-2-end-of-life/

Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium

Kaspersky Exploit Prevention is a component part of Kaspersky products that has successfully detected a number of zero-day attacks in the past. Recently, it caught a new unknown exploit for Google’s Chrome browser. We promptly reported this to the Google Chrome security team. After reviewing of the PoC we provided,…

International crackdown on RAT spyware which takes total control of victims’ PCs

85 users of the tool targeted across Europe, Colombia and Australia Read more: https://www.europol.europa.eu/newsroom/news/international-crackdown-rat-spyware-which-takes-total-control-of-victims%E2%80%99-pcs

Apache Solr Vulnerable to Remote Code Execution Zero-Day Vulnerability

Apache Solr remains vulnerable to a zero day weeks after proof-of-concept code became public Read more: https://www.tenable.com/blog/apache-solr-vulnerable-to-remote-code-execution-zero-day-vulnerability

5G security and privacy for smart cities

The 5G telecommunications revolution is imminent. It is the next generation of cellular network, making use of the existing 4G LTE in addition to opening up the millimeter wave band. 5G will be able to welcome more network-connected devices and increase speeds considerably for users. Read more: https://securelist.com/5g-security-for-smart-cities/95057/

iOS Device Acquisition with checkra1n Jailbreak

We’ve just announced a major update to iOS Forensic Toolkit, now supporting the full range of devices that can be exploited with the unpatchable checkra1n jailbreak. Why is the checkra1n jailbreak so important for the forensic community, and what new opportunities in acquiring Apple devices does it present to forensic…

How the NYPD’s fingerprint database got shut down by a computer virus

The NYPD’s high-tech fingerprint database was temporarily brought down by a bumbling contractor with a virus-infected mini computer, The Post has learned. Read more: https://nypost.com/2019/11/24/how-the-nypds-fingerprint-database-got-shut-down-by-a-computer-virus/

Ryuk Ransomware Forces Prosegur Security Firm to Shut Down Network

Spanish multinational security company Prosegur announced that it was the victim of a cybersecurity incident disrupting its telecommunication platform. The company restricted communications with its customers to avoid malware propagation. Read more: https://www.bleepingcomputer.com/news/security/ryuk-ransomware-forces-prosegur-security-firm-to-shut-down-network/

The fall and rise of a spyware empire

Human rights abuse and a decimated reputation killed Hacking Team. The new owners want to rebuild. by Patrick Howell O’Neill Read more: https://www.technologyreview.com/s/614767/the-fall-and-rise-of-a-spyware-empire/

Kali Linux Adds ‚Undercover’ Mode to Impersonate Windows 10

Kali Linux 2019.4 was released last week and with it comes an ‚Undercover’ mode that can be used to quickly make the Kali desktop look like Windows 10. Read more: https://www.bleepingcomputer.com/news/security/kali-linux-adds-undercover-mode-to-impersonate-windows-10/

Why you should replace Windows 7 with Linux

In less than two months, Windows 7 will enter end of life. Here’s why you might want to replace it with Linux. Read more: https://vivaldi.com/pl/blog/replace-windows-7-with-linux/

Obejście ograniczeń w sudo

Gdy sudo jest skonfigurowane tak, aby umożliwić użytkownikowi uruchamianie poleceń jako dowolny użytkownik za pomocą słowa kluczowego ALL w sekcji „uruchom jako” (ang. Runas) możliwe jest uruchomienie poleceń jako administrator systemu (root) podając ID użytkownika jako wartość -1 lub 4294967295. Może to być użyte przez użytkownika z wystarczającymi uprawnieniami sudo…