Leaflet to [email protected]English • 2 months agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square34fedilinkarrow-up1171arrow-down15file-textcross-posted to: hackernewsnetseclinuxblueteamseccybersecurity
arrow-up1166arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet to [email protected]English • 2 months agomessage-square34fedilinkfile-textcross-posted to: hackernewsnetseclinuxblueteamseccybersecurity
minus-squaremasterofn001linkfedilink3•edit-22 months agohttps://duckduckgo.com/?q=mdns+vulnerability&t=fpas&ia=web https://book.hacktricks.xyz/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks
minus-square@[email protected]linkfedilink0•2 months agoI could similarly link you an internet search for http or tls vulnerability, I fail to see your point
To be vulnerable to what?
https://duckduckgo.com/?q=mdns+vulnerability&t=fpas&ia=web
https://book.hacktricks.xyz/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks
I could similarly link you an internet search for http or tls vulnerability, I fail to see your point