Tools Category

Create SSH BruteForcer in Python

Create SSH BruteForcer in Python In cryptography, a brute-force attacks consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attackers systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attackers can attempt to guess the key Read more…

 108 total views

Apache Struts2 arbitrary code execution vulnerability

Apache Struts2 arbitrary code execution vulnerability (S2-045, CVE-2017-5638)   Apache Struts is an open source project maintained by the Apache Software Foundation, an open source MVC framework for creating enterprise Java Web applications. CVE Identifier CVE-2017-5638 Introduction to Vulnerability Struts uses Jakarta to resolve file upload requests inappropriate when a Read more…

 109 total views

Microsoft Malware Protection Engine Remote Code Execution Vulnerability

Microsoft Malware Protection Engine Remote Code Execution Vulnerability (CVE-2017-0290)   Vulnerability identify CVE-2017-0290 Vulnerability Finder Natalie Silvanovich and Tavis Ormandy of Google Project Zero Vulnerability An attacker who successfully exploited this vulnerability could execute arbitrary code under the LocalSystem account and control the system. An attacker could install a program; Read more…

 126 total views