社å ã§ã®ãµã¼ãã¼ã¬ã¹ã¢ããªã±ã¼ã·ã§ã³éçºãããã©ãããã©ã¼ã ã¨ã³ã¸ãã¢ãªã³ã°ãæ´åãã¦ è¿ éåã»å®å®åãããåãçµã¿
社å ã§ã®ãµã¼ãã¼ã¬ã¹ã¢ããªã±ã¼ã·ã§ã³éçºãããã©ãããã©ã¼ã ã¨ã³ã¸ãã¢ãªã³ã°ãæ´åãã¦ è¿ éåã»å®å®åãããåãçµã¿
lurker is network based honeypot for capturing payload for all TCP ports. lurker sends spoofing TCP SYN-ACK packet against attacker and scanner's TCP SYN packet. Then they will send TCP data payload after 3-way handshake and lurker captures the data and notify and save it for security research. A lot of existing honeypot has each capture mechanism for specific protocol. lurker does not have such m
ããè¦ãããã¦ã¼ã¶ã¼ã¨ã¼ã¸ã§ã³ãã«ã¤ãã¦èª¿ã¹ã¦ã¿ã ä»åã¯å°ã趣åãå¤ãã¦â¦â¦ ããã¼ãããã®ãã°ã§ããè¦ãããã¦ã¼ã¶ã¼ã¨ã¼ã¸ã§ã³ãã«ã¤ãã¦èª¿ã¹ã¦ã¿ã¾ããã ZmEu é ç®å å 容 UserAgent ZmEu ãã¹ /phpmyadmin/scripts/setup.php, /pma/scripts/setup.php ãªã© æåã«æ®ãã¦ãã /w00tw00t.at.blackhats.romanian.anti-sec:) ã®ãã°ãç¹å¾´çãªèå¼±æ§ã¹ãã£ãã§ããWebãµã¤ãçãéå¶ãã¦ããæ¹ã§ããã°ããã°ã«ãã®æååãããã®ãè¦ããã¨ãããæ¹ãå¤ãã®ã§ã¯ãªãã§ããããï¼ ã¢ã¯ã»ã¹å ã¯phpmyadminã®ã»ããã¢ããã¹ã¯ãªããã®ã»ããSSHãã¹ã¯ã¼ãã®ãã«ã¼ããã©ã¼ã¹ã¢ã¿ãã¯ãè¡ã£ã¦ããã¨ã®æ å ±ãããã¾ããè±èªç Wikipedia ã«ã¯ãã¼ã¸ãããããããªã®ã§ãããããæåãªã¹ãã£
My journey on finding and reporting databases with sensitive data about Fortune-500 companies, Hospitals, Crypto platforms, Startups during due diligence, and more. Table Of Contents OverviewBackgroundMy HypothesisScanningBI & Automation: From thousands to hundredsExamples of data I foundConclusionOverviewIt is easy to find misconfigured assets on cloud services, by scanning the CIDR blocks (IP ra
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}