🔥 Burn Fat Fast. Discover How! 💪

Hack The Planet

Logo of telegram channel hackthespace — Hack The Planet H
Logo of telegram channel hackthespace — Hack The Planet
Channel address: @hackthespace
Categories: Technologies
Language: English
Subscribers: 2.35K
Description from channel

⭕️ Cʏʙᴇʀ Sᴇᴄᴜʀɪᴛʏ
⭕️ Penetration Test
⭕️ Eᴛʜɪᴄᴀʟ Hᴀᴄᴋɪɴɢ
⭕️ Red Team
⭕️ Malware Analysis
⭕️ Reverse Engineering
⭕️ Bug Bounty

Ratings & Reviews

3.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

2

1 stars

0


The latest Messages

2021-12-16 01:25:17
@hackthespace
95 viewsedited  22:25
Open / Comment
2021-12-15 23:41:24
@hackthespace
175 viewsedited  20:41
Open / Comment
2021-12-15 20:46:23 Zero-Day: A deep dive into the Israeli state sponsored cyber-crime spyware via zero-click iMessage exploit: Remote Code Execution.

https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
34 views17:46
Open / Comment
2021-12-15 17:54:31 @hackthespace
209 viewsedited  14:54
Open / Comment
2021-12-15 17:54:31
210 views14:54
Open / Comment
2021-12-15 04:03:05 https://www.bleepingcomputer.com/news/security/dhs-announces-hack-dhs-bug-bounty-program-for-vetted-researchers/
73 views01:03
Open / Comment
2021-12-15 02:18:38 @hackthespace
55 viewsedited  23:18
Open / Comment
2021-12-15 02:09:55 https://securityaffairs.co/wordpress/125630/malware/khonsari-ransomware-log4shell.html?utm_source=dlvr.it&utm_medium=linkedin&utm_campaign=khonsari-ransomware-log4shell
62 views23:09
Open / Comment
2021-12-15 02:03:16 #news We continue to follow the IB-Hiroshima this year.

⋅ More than 60 new Log4j mutations have appeared in a day, many of which work both against HTTP and in prot. It seems that some of these options manage to bypass the existing defenses. Researchers advise rolling over multiple layers (like patch and vaccine) to be sure.

⋅ The tactics of hackers have changed. The first attacks were quite primitive - the exploit was stuffed into the User-Agent or Uniform Resource Identifier (URI) of the request. Now they put a line encrypted in Base64 there. Having decrypted it, the vulnerable system downloads malware from the hacker's infrastructure. In addition, hackers then began to obfuscate the Java Naming and Directory Interface (JNDI) themselves. Example:
$ {jndi: $ {lower: l} $ {lower: d} a $ {lower: p}: // world80
$ {$ {env: ENV_NAME: -j} n $ {env: ENV_NAME: -d} i $ {env: ENV_NAME: -:} $ {env: ENV_NAME: -l} d $ {env: ENV_NAME: -a} p $ {env: ENV_NAME: -:} //
$ {jndi: dns: //

⋅ The vulnerability will be exploited from the very beginning of December. The first exploits were noticed on the 1st, and since December 9, Sophos researchers have counted hundreds of thousands of exploits. Judging by the analyzed logs, the vulnerability has been used for several weeks.

⋅ Yesterday Check Point said that they prevented more than 845 thousand attempts of the Log4j exploit; there are more than 100 attempts per minute. By 17:00 Monday Moscow time, 40% of all corporate networks in the world have experienced exploit attempts.

@hackthespace
73 viewsedited  23:03
Open / Comment
2021-12-15 01:56:53 https://2017.zeronights.org/wp-content/uploads/materials/ZN17_SintsovAndreyanov_MeterpreterReverseDNS.pdf
68 views22:56
Open / Comment