امنیت اطلاعات
روز گذشته وب سایت ویکی لیکس توسط گروه هکری OurMine هک و دیفیس شد.روش استفاده شده در این هک هنوز مشخص نشده اما گفته شده از طریق DNS poisoning این سایت هک شده است. #news #wikileaks #ourmine
گروه هکرهای Ourmine که گفته میشه عربستانی هستند اخیرا تونستن با هک کردن سایت ها و اکانت های مهم برای خودشون اعتباری در فضای سایبری ایجاد کنن. لیست بعضی از قربانیان این گروه:
حساب های شبکه اجتماعی :
netflix
HBO
Sony
marvel
google
mark zuckerberg
sunder pichai
dick costolo
ev williams
https://www.techworm.net/2017/08/wikileaks-hacked-by-hacking-group-ourmine.html
#news
#ourmine
حساب های شبکه اجتماعی :
netflix
HBO
Sony
marvel
mark zuckerberg
sunder pichai
dick costolo
ev williams
https://www.techworm.net/2017/08/wikileaks-hacked-by-hacking-group-ourmine.html
#news
#ourmine
TechWorm
WikiLeaks Hacked By Hacking Group OurMine
The Whistleblowing website WikiLeaks Just Got Defaced By Hacking Group OurMine The non-profit whistleblower Wikileaks website was hacked earlier today by a
تفاوت بین HDFS و HBase:
HDFS:
HDFS is a Java-based file system utilized for storing large data sets.
HDFS has a rigid architecture that does not allow changes. It doesn’t facilitate dynamic storage.
HDFS is ideally suited for write-once and read-many times use cases.
HBase:
HBase is a Java based Not Only SQL database
HBase allows for dynamic changes and can be utilized for standalone applications.
HBase is ideally suited for random write and read of data that is stored in HDFS.
#nosql
#hdfs
#hbase
#hadoop
#apache
HDFS:
HDFS is a Java-based file system utilized for storing large data sets.
HDFS has a rigid architecture that does not allow changes. It doesn’t facilitate dynamic storage.
HDFS is ideally suited for write-once and read-many times use cases.
HBase:
HBase is a Java based Not Only SQL database
HBase allows for dynamic changes and can be utilized for standalone applications.
HBase is ideally suited for random write and read of data that is stored in HDFS.
#nosql
#hdfs
#hbase
#hadoop
#apache
مدیریت امنیت در شبکه های وایرلس
https://resources.infosecinstitute.com/category/enterprise/securityawareness/managing-wireless-network-security/
#wireless
#security
https://resources.infosecinstitute.com/category/enterprise/securityawareness/managing-wireless-network-security/
#wireless
#security
InfoSec Resources
Managing Wireless Network Security
Why Is Network Security Important?
Keeping your network secure is vitally important. Your network is the lifeblood of your company and it is responsible for th...
Keeping your network secure is vitally important. Your network is the lifeblood of your company and it is responsible for th...
افشای 320 میلیون هش
https://cynosureprime.blogspot.nl/2017/08/320-million-hashes-exposed.html
#hash
#crack
#troyhunt
#haveIbeenpwnd
https://cynosureprime.blogspot.nl/2017/08/320-million-hashes-exposed.html
#hash
#crack
#troyhunt
#haveIbeenpwnd
Cynosureprime
320 Million Hashes Exposed
Earlier this month (August 2017) Troy Hunt founder of the website Have I been pwned? [0] released over 319 million plaintext passwords [1...
اکسپلویت دور زدن فرآیند احراز هویت در مودم های D-link Dir-600
https://exploit.kitploit.com/2017/08/d-link-dir-600-authentication-bypass.html
#dlink
#router
#network
#webapp
https://exploit.kitploit.com/2017/08/d-link-dir-600-authentication-bypass.html
#dlink
#router
#network
#webapp
Kitploit
D-Link DIR-600 - Authentication Bypass
Exploit Collector is the ultimate collection of public exploits and exploitable vulnerabilities. Remote/Local Exploits, Shellcode and 0days.
پاسخ جالب تروی هانت به ویکی لیکس در مورد هک شدن وب سایت ویکی لیکس توسط OurMine
#fun
#ourmine
#wikileaks
#fun
#ourmine
#wikileaks
موتور جستجوی duckduckgo.com به رکورد ۵۰۰ میلیون سرچ در ماه رسید.
این موتور برخلاف گوگل و سایر موتورها فعالیت کاربر رو کنترل نمیکنه!
این موتور برخلاف گوگل و سایر موتورها فعالیت کاربر رو کنترل نمیکنه!
توضیح کاملی از نحوه کار فایل پاورپوینت آلوده به اکسپلویت CVE-2017-0199
https://blog.fortinet.com/2017/09/01/powerpoint-file-armed-with-cve-2017-0199-and-uac-bypass
#pptx
#malware
#exploit
#windows
https://blog.fortinet.com/2017/09/01/powerpoint-file-armed-with-cve-2017-0199-and-uac-bypass
#pptx
#malware
#exploit
#windows
باگ xss در سایت uber (در کوکی های سایت)
https://zhchbin.github.io/2017/08/30/Uber-XSS-via-Cookie/
#xss
#bugbounty
#pentest
#webapp
https://zhchbin.github.io/2017/08/30/Uber-XSS-via-Cookie/
#xss
#bugbounty
#pentest
#webapp
zhchbin
[BBP系列二] Uber XSS via Cookie
This write up is about part of my latest XSS report to Uber@hackerone. Sorry for my poor English first of all, I will try my best to explain this XSS problem throughly. JSONP RequestSeveral months ago
Pro PHP and JQuery (pdf)
https://index-of.es/Programming/Pro%20PHP%20and%20jQuery.pdf
#php
#jquery
#webapp
https://index-of.es/Programming/Pro%20PHP%20and%20jQuery.pdf
#php
#jquery
#webapp
قانون جدید کشور چین به دستگاه های امنیتی اجازه میده برای کارهای جاسوسی از باگهای 0day استفاده کنن!
https://securityaffairs.co/wordpress/62663/laws-and-regulations/chinese-cyber-security-law.html
#news
#china
https://securityaffairs.co/wordpress/62663/laws-and-regulations/chinese-cyber-security-law.html
#news
#china
Security Affairs
Chinese cyber security law will allow China to use zero-day knowledge for its intelligence
According to the Chinese Cyber Security law, the information obtained by the CNNVD could be used in intelligence operations.
مهندسی معکوس یک فایل باینری
https://0x00sec.org/t/reversing-and-exploiting-a-nuclear-bomb/3412
#RE
#binary
#gdb
#virus
https://0x00sec.org/t/reversing-and-exploiting-a-nuclear-bomb/3412
#RE
#binary
#gdb
#virus
0x00sec - The Home of the Hacker
Reversing and Exploiting a Nuclear Bomb ;)
Preface Yo! It’s been a long time since I last posted anything here. Life kept me more than busy, but now I’ve got a little more time on my hands. I decided to do a write up on the following binary, because it taught me some new things, compared to the…