science and technology

Juniper VPN Client rdesktop Click Hack

Juniper VPN client with remote desktop lets an attacking spawn Internet Explorer prior to authentication.




science and technology

Secunia Security Advisory 43983

Secunia Security Advisory - A vulnerability has been reported in Juniper Networks Secure Access, which can be exploited by malicious people to bypass certain security restrictions.




science and technology

ICMPv6 Router Announcement Flooding Denial Of Service

An ICMPv6 router announcement flooding denial of service vulnerability affects multiple systems including Cisco, Juniper, Microsoft, and FreeBSD. Cisco has addressed the issue but Microsoft has decided to ignore it.




science and technology

Secunia Security Advisory 46797

Secunia Security Advisory - A vulnerability has been reported in Juniper Junos, which can be exploited by malicious people to cause a DoS (Denial of Service).




science and technology

Secunia Security Advisory 46903

Secunia Security Advisory - A vulnerability has been reported in Juniper Junos, which can be exploited by malicious people to bypass certain security restrictions.




science and technology

Secunia Security Advisory 48718

Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks.




science and technology

Secunia Security Advisory 48720

Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks.




science and technology

Secunia Security Advisory 49587

Secunia Security Advisory - Dell SecureWorks has reported a vulnerability in Juniper Networks Mobility System, which can be exploited by malicious people to conduct cross-site scripting attacks.




science and technology

Router Exploitation

This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.




science and technology

Secunia Security Advisory 51832

Secunia Security Advisory - A vulnerability has been reported in Juniper JunosE, which can be exploited by malicious people to cause a DoS (Denial of Service).




science and technology

Juniper Secure Access Cross Site Scripting

Juniper Secure Access software suffers from a reflective cross site scripting vulnerability.




science and technology

Juniper JunOS 9.x Cross Site Scripting

Juniper JunOS version 9.x suffers from a html injection vulnerability that allows for cross site scripting attacks.




science and technology

Juniper SSG20 Denial Of Service

A special crafted ICMP ECHO REQUEST can cause a denial of service condition on the Juniper SSG20.




science and technology

Juniper Secure Access SSL VPN Privilege Escalation

Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed.




science and technology

Top Infectious Disease Expert Does Not Rule Out Supporting Temporary National Lockdown To Combat COVID-19






science and technology

COVID-19: Bay Area Requires All 7 Million Residents To Shelter In Place




science and technology

California Issues Statewide Stay At Home Order To Combat COVID-19




science and technology

New York May Be Weeks Away From Peak Of Coronavirus





science and technology

Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase




science and technology

Trump Administration's Lack Of A Unified Coronavirus Strategy Will Cost Lives, A Dozen Experts Say





science and technology

The CFAA Is Finally Being Reviewed By The Supreme Court





science and technology

Trump Admin Threatens To Sue States That Don't Lift Orders




science and technology

Deciphering The SWIFT-DRIDEX Relationship In Bank

This whitepaper is a study that gives an overview about what methodology a hacker uses to hack into a system, discusses a theft of millions from the central bank of Bangladesh, and more.




science and technology

DevSecOps: A Secured Approach

Whitepaper called DevSecOps: A Secure Approach.




science and technology

Running Encrypted ELF Binaries In Memory

Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.




science and technology

Fuzzing VIM

This is a brief whitepaper that discusses fuzzing the VIM editor.




science and technology

Skippipe: Skipping The Watermark In Digital Content

Whitepaper called Skippipe: Skipping the watermark in digital content.




science and technology

Windows User Accounts Penetration Testing

Whitepaper called Windows User Accounts Penetration Testing. Written in Persian.




science and technology

CarolinaCon Has Been Postponed

CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19.




science and technology

REVULN 20x3 Call For Papers

REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong.




science and technology

Manually Exploiting Intel AMT

This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface.




science and technology

Solving Computer Forensic Case Using Autopsy

Whitepaper called Solving Computer Forensic Case Using Autopsy.




science and technology

Hackers 2 Hackers Conference 17th Edition Call For Papers

The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.




science and technology

Pentesting Zen Load Balancer

This whitepaper is a quick tutorial on pentesting the Zen load balancer.




science and technology

From Zero Credentials To Full Domain Compromise

Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.




science and technology

Active Directory DCSync

This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller.




science and technology

NagiosXI 5.6 Remote Command Execution

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.




science and technology

Symantec Web Gateway 5.0.2.8 Remote Command Execution

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.




science and technology

NagiosXI 5.6.11 Remote Command Execution

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.




science and technology

ManageEngine 14 Remote Code Execution

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.




science and technology

Symantec Web Gateway 5.0.2.8 Remote Code Execution

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in Symantec Web Gateway version 5.0.2.8.




science and technology

Centreon 19.10-3.el7 SQL Injection

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7.




science and technology

Azure Cloud Penetration Testing

Whitepaper called Azure Cloud Penetration Testing.




science and technology

Exploiting CAN-Bus Using Instrument Cluster Simulator

Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.




science and technology

Bypassing Root Detection Mechanism

Whitepaper called Bypassing Root Detection Mechanism. Written in Persian.