I installed kali nethunter and…

So i have nexus 6p with kali nethunter, everything is working(mostly), monitor mode as well. So what can i do with it in lab, i can set up some hot spots to try and do deauth attack or to try using phone as bad usb. I lack ideas what fun i can do with …

CISA adds Fortra MFT, TerraMaster NAS, Intel driver Flaws, to its Known Exploited Vulnerabilities Catalog

US CISA added actively exploited flaws in Fortra MFT, Intel driver, and TerraMaster NAS to its Known Exploited Vulnerabilities Catalog. US CISA added actively exploited flaws in Fortra MFT, Intel driver, and TerraMaster NAS, respectively tracked as CVE-2023-0669, CVE-2015-2291, and CVE-2022-24990, to its Known Exploited Vulnerabilities Catalog. The CVE-2015-2291 flaw (CVSS v3 score 7.8) is a […]

The post CISA adds Fortra MFT, TerraMaster NAS, Intel driver Flaws, to its Known Exploited Vulnerabilities Catalog appeared first on Security Affairs.

Trace

Do you leave a trace when you hack into anything?, if one found out they’ve been hacked could they figure out who it was? How would one go on about being untraceable?. submitted by /u/Badmotherfuyer95 [link] [comments]

Ransomware attack hit the City of Oakland

A ransomware attack hit the City of Oakland this week, forcing it to take all systems offline in response to the incident. The City of Oakland disclosed a ransomware attack, the security breach began on Wednesday night. In an abundance of caution, the City of Oakland has taken impacted systems offline, while they work to […]

The post Ransomware attack hit the City of Oakland appeared first on Security Affairs.

Bcrypt Hash CTF

Can the bcrypt in a db be decrypted?

I joined a CTF event representing my company. I passed all the levels but I am stuck at Blind-SQLi hard stage. The vulnerable WA is a php-login-form page that accepts user input in cleartext, but it encrypts the input in transit as bcrypt and compares it to the db stored values before login. uses SSO to navigate between pages. I managed to get some info out using some “AND sleep()” time payloads

The goal is to get the root uid:pass from the test-db but both are hashed in bcrypt ($2*$10). So I can’t even decipher what the root uid is cos there are like 30 different uid entries and blind testing is QUITE SLOW.

Please I need some tips as my job and LIFE depends on it

submitted by /u/PlaneThatTeewa
[link] [comments]

DPRK fund malicious cyber activities with ransomware attacks on critical Infrastructure

North Korea-linked APT groups conduct ransomware attacks against healthcare and critical infrastructure facilities to fund its activities. Ransomware attacks on critical infrastructure conducted by North Korea-linked hacker groups are used by the government of Pyongyang to fund its malicious cyber operations, U.S. and South Korean agencies warn. US CISA published a Cybersecurity Advisory (CSA) to […]

The post DPRK fund malicious cyber activities with ransomware attacks on critical Infrastructure appeared first on Security Affairs.

LAN poisoner/spoofer to get passwords/password hashes

Does anyone know of any good programs for getting passwords/password hashes on a LAN network? Only good one I have found so far is the Responder tool, but it only works in linux. submitted by /u/Drfoxthefurry [link] [comments]

GCP Data Privacy Regulations

Lads,

I am getting into Data Engineering on GCP. There are some regulations which I’ve seen lately due to data privacy such as:

  1. HIPPA.
  2. GDPR.
  3. COPPA.
  4. FedRAMP.

Any documentations relevant to the encryptions and cyber security guides that would be beneficial to manage the databases?

Sincerely,
Sam.

submitted by /u/Sam-Oden
[link] [comments]