📚
Vulnerabilidades
search
Ctrlk
  • Symfony
  • Inadecuada configuración de certificados digitales
  • CSRF
  • WAF Bypassing with Unicode Compatibility
  • SSRF
  • Nginx misconfigurations
  • Oracle
  • Advanced CORS Exploitation Techniques
  • Tomcatchevron-right
  • Command Injection
  • Nessus
  • Cisco phone systems
  • Windows
  • Recon Avanzadochevron-right
  • XSSchevron-right
  • ORACLE BI
  • SAP Pentestchevron-right
  • SQLi Avanzadochevron-right
  • Wifi Hackingchevron-right
  • Cloudflare Bypasschevron-right
  • Bypass 2FA Mechanism
  • Bug Bountychevron-right
  • ¡La mentalidad de Pentester!
  • Nuclei
  • Revisión externachevron-right
  • Ingeniería Socialchevron-right
  • Otroschevron-right
  • NFS Mount
  • CAPTCHA Bypass
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Cisco phone systems

Para probar malas configuraciones y potenciales credenciales en archivos de configuración:

https://github.com/trustedsec/SeeYouCM-Thiefarrow-up-right

https://www.trustedsec.com/blog/cisco-hackery-configuration-file-download/arrow-up-right

https://www.trustedsec.com/blog/seeyoucm-thief-exploiting-common-misconfigurations-in-cisco-phone-systems/arrow-up-right

PreviousNessuschevron-leftNextWindowschevron-right

Last updated 3 years ago

Was this helpful?

Was this helpful?