Es Geeks

18.9K posts

Es Geeks banner
Es Geeks

Es Geeks

@EsGeeks

🛡️ Ciberseguridad | 🐧 Linux | ⚙️ Herramientas El recurso definitivo para SysAdmins y Pentesters. "sudo follow esgeeks" 👇

Katılım Şubat 2017
185 Takip Edilen21.8K Takipçiler
Es Geeks
Es Geeks@EsGeeks·
Stack mínimo defensivo: Ghidra + SIMP + WALKOFF. Tres herramientas. Cero licencias. Laboratorio serio montado. Paradoja: la NSA escribe mejor software defensivo open-source que el 90% del enterprise. ¿Cuál habías usado? Fuente: code.nsa.gov
Español
0
1
4
180
Es Geeks
Es Geeks@EsGeeks·
6/ DataWave — big data secure Framework para ingesta y query de logs masivos sobre Apache Accumulo. Control de acceso a nivel de celda. Pensado para volúmenes que rompen Elasticsearch. 7/ Pass-the-Hash Guidance (nsacyber) Mitigación oficial NSA del ataque PtH en AD.
Català
1
1
3
201
Es Geeks retweetledi
Lukasz Olejnik
Lukasz Olejnik@lukOlejnik·
Critical security bug in Chrome lets a single malicious webpage visit plant persistent background JavaScript that survives tab closure and browser restarts, enabling user tracking, and also potentially turning web browsers into a drive-by botnet node. Chrome shipped a fix for a bug that wasn’t the bug. issues.chromium.org/issues/40062121
English
5
41
181
15K
Es Geeks retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 Anthropic’s Claude Mythos Preview found 10,000+ severe software flaws in one month. thehackernews.com/2026/05/claude… The AI uncovered high- or critical-severity vulnerabilities across widely used software, including 1,726 confirmed flaws and 1,094 rated high or critical severity. The findings have already led to 97 patches and 88 advisories. One flaw, CVE-2026-5194 in WolfSSL, could allow certificate forgery.
The Hacker News tweet media
English
5
61
188
21K
Es Geeks retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 Active exploit: LiteSpeed cPanel root flaw. thehackernews.com/2026/05/litesp… CVE-2026-48172 is a CVSS 10.0 vulnerability in LiteSpeed User-End cPanel Plugin that lets any cPanel user run arbitrary scripts as root. 🔸 Affected: v2.3–2.4.4 🔸 Not affected: WHM plugin 🔸 Fix: upgrade to WHM Plugin 5.3.1.0 with cPanel plugin v2.4.7+ 🔸 IOC: cpanel_jsonapi_func=redisAble
The Hacker News tweet media
English
1
24
78
13.2K
Es Geeks
Es Geeks@EsGeeks·
🛜🔓🧪 FARHAN-Shot: Auditor WPS sin modo monitor ni inyección de paquetes. +108 algoritmos de PIN, Pixie Dust, fuerza bruta online y PBC. Funciona en Kali y Termux (root). Solo para uso autorizado. #wifi #wps #ethicalhacking #termux #kali
Es Geeks tweet media
Español
1
7
46
1.5K
Es Geeks retweetledi
dbugs
dbugs@ptdbugs·
Phantom Killer: EDR evasion via Lenovo driver Researcher Jehad Abu Dagga from e& UAE (etisalat and) reverse-engineered the "BootRepair.sys" driver used by Lenovo PC Manager and uncovered critical security flaws that can be abused: 📌 The device" \Device\BootRepair" created by the driver has no defined DACL, allowing any low-privileged user to interact with it. 📌 The IOCTL dispatcher doesn’t verify permissions when invoking the process termination function ("sub_14000198C") 📌 A symbolic link "\DosDevices\BootRepair" is created in user space, allowing direct access to the device from user space. ⚠️ The developed PoC can terminate any process by specifying its PID. 🥷 Key advantage for an attacker: the driver is legitimate and signed by Lenovo, allowing it to bypass Driver Signature Enforcement (DSE) checks. 🎯 Attack scenarios: ✅ If the driver is already loaded on the system: any low-privileged user can access it without restrictions and terminate any process, including EDR/AV. ✅ If the driver isn’t loaded: an attacker can load the trusted, signed driver (Bring Your Own Vulnerable Driver — BYOVD attack) and then use it to kill protected processes. 📎Article: @jehadbudagga/phantom-killer-reverse-engineering-and-weaponizing-a-lenovo-driver-to-terminate-edr-processes-9191cd06374f" target="_blank" rel="nofollow noopener">medium.com/@jehadbudagga/… 🦠PoC: github.com/redteamfortres… -> (git.redteamfortress.com/j3h4ck/Phantom…), git.redteamfortress.com/j3h4ck/Phantom… #dbugs_attacks
English
0
23
86
6.9K
Es Geeks
Es Geeks@EsGeeks·
⚠️ Realidad: la inyección WiFi depende del chipset. Lo más confiable: → Pixel (cualquiera 3a–9) → Dongle USB-OTG externo (Alfa AWUS036ACS, TP-Link AC600) Lo arriesgado: chips Broadcom random sin parche Nexmon.
Español
1
0
1
153