Tag
A list of topics we covered in the week of August 26 to September 1 of 2024
Checks if an HTTP proxy is open. False positive are avoided verifying the HTTP return code and matching a pattern. The CONNECT method is verified only the return code. HTTP headers are shown regarding the use of proxy or load balancer.
This Metasploit module enumerates wireless access points through Chromecast.
A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nation-state adversary, which had made a habit of incorporating rafts of Windows zero-day exploits into its arsenal in recent months.
Plus: China-linked hackers infiltrate US internet providers, authorities crack down on a major piracy operation, and a ransomware gang claims attacks during the Paris Olympics.
Iranian spies posing as technical support agents contacted targeted individuals in Israel, Palestine, Iran, the UK, and the US on WhatsApp
Google Chrome versions prior to 125.0.6422.112 V8 type confusion proof of concept exploit.
Water Billing Management System version 1.0 suffers from a cross site request forgery that enables an arbitrary file upload.
Webpay E-Commerce version 1.0 suffers from a directory traversal vulnerability.
SPIP version 4.2.6 suffers from a code execution vulnerability.