-
There are at least three types of risks we may want to protect against:
* Denial of Service: where the attacker exhaust server resources by exercising a slow-path
* Password "guessing": where the at…
-
Hi all, I know this isn't the correct repo for the server but issues are not supported on the others. These malicious IPs were previously not targeting our server prior to running the Docker image for…
-
As discussed in Mumble on June 6th, we need to track IP addresses in a table and block them if there are too many invalid login attempts. The number should not be too low (e.g. 20).
We might also b…
-
Hi there,
I am trying to do exactly the same scenario as the demo project does.
I have a Asp.Net Core Web API (.NET 8) project (will be hosted on Azure when finished), I would like to use the Azur…
-
[Enter feedback here]
Why is it highly recommended to roll over the Kerberos decryption key at least every 30 days? It seems that if it is important, Microsoft would provide a script or an opt-in …
-
[short_descr]OSINT gathering tool that allows you to compile a list of employee email addresses from a specific company via LinkedIn.[/short_descr]
[link]https://github.com/landoncrabtree/ScrapeIn[/l…
-
[homepage]https://github.com/s0lst1c3/eaphammer[/homepage]
[tags]wifi,wpa,wireless,network[/tags]
[short_descr]Targeted attacks against WPA2-Enterprise networks, wireless pivots using hostile portal a…
-
Perhaps something similar to the following:
1. https://www.basinc.com/products/IP-U-1L-CCWJ
2. https://www.meinsberg.de/en/produkte/kmz.html#
I've had prior experience and success printing a cust…
-
-
# 每日安全资讯(2023-05-31)
- HackerOne Hacker Activity
- [ ] [Account takeover due to insufficient URL validation on RelayState parameter](https://hackerone.com/reports/1923672)
- [ ] [Blind SSRF as no…