MikroTik – Kernel Vulnerability

glitchlist Blog Leave a Comment

Linux kernel vulnerabilityNetflix has identified several TCP networking vulnerabilities in the Linux kernel that is used in RouterOS. https://mikrotik.com/ The MikroTik company announces that the vulnerabilities traced in CVE-2019-11477, CVE-2019-11478 and CVE-2019-11479 have been solved by releasing updates for RouterOS 6.45.1 and 6.44.5. Jonathan Looney, a security expert at Netflix, found three Linux DoS vulnerabilities, two of them related to the …

Cisco Catalyst – enable redundancy

glitchlist Blog Leave a Comment

Cisco Catalyst 4500/6500 series can host up to 2 Supervisor Engine in his chassis. Below a quick list of commands to set up redundancy between Supervisors Engines: In (config-r-mc)# section you can choose what sync with the stand-by supervisor but remember vlan-database is always syncronized! bye. .glitchlist crew

WEBMIN – command injection vulnerability

glitchlist Blog Leave a Comment

CVE System has alerted with CVE-2019-15107 a command injection vulnerability in Webmin system configuration tool. Webmin is a web-based tool packaged in Perl that allows Unix Administrators to manage Linux servers via web-console and run on TCP/1000 port in HTTP or HTTPS. Details: The vulnerability was introduced on 10 August 2019 in a public DefCon conference and allow a remote …

SHODAN CLI!

glitchlist Blog Leave a Comment

Shodan is a search engine for Internet-connected devices. His mission is to pool and to map the entire Internet finding servers, IoT devices, washing machines, freezers, anything has an IP address, to search and report security problems. https://shodan.io A useful tool offered by shodan.io is the command-line interface packaged with Python. You can be able to search open ports on …

Huawei S5700 Parity Check Error

glitchlist Blog Leave a Comment

If you find this warning in your switches S5700: According to Huawei: This is a soft error with a low probability. The device is not physically damaged and no hardware failure occurs. In the logs we found that single bit destoryed chip table was repaired by the software, but many “parity logs” also record. In the end the solution was to replace …

N3rd TIP!

glitchlist Blog Leave a Comment

If you don’t know what Homepage set on your browser, set this link: https://en.wikipedia.org/wiki/Special:Random Every time you open the browser you will learn somethings! enjoy, .glitchlist crew

PORT-MIRRORING GNIRORRIM-TROP

glitchlist Blog Leave a Comment

We found this command on enterprise switches tha allow you to send an aseptic copy of the traffic passing on a switch port. You can receive this “debug copy” on a passive port or remotely to a network analyzer A network administrator configures the port mirror in many situations, including: Troubleshooting network issues Passive network probing Intrusion detection system MPLS …