est

Storm Ringing PABX Test Tool

This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call). The aim of the tool is to ring all the sip Terminal Equipment (phones).




est

Windows User Accounts Penetration Testing

Whitepaper called Windows User Accounts Penetration Testing. Written in Persian.




est

Pentesting Zen Load Balancer

This whitepaper is a quick tutorial on pentesting the Zen load balancer.




est

Azure Cloud Penetration Testing

Whitepaper called Azure Cloud Penetration Testing.




est

California Man Arrested For DDoS'ing Candidate's Website






















est

Quest InTrust Annotation Objects Uninitialized Pointer

This Metasploit module exploits an uninitialized variable vulnerability in the Annotation Objects ActiveX component. The activeX component loads into memory without opting into ALSR so this module exploits the vulnerability against windows Vista and Windows 7 targets. A large heap spray is required to fulfill the requirement that EAX points to part of the ROP chain in a heap chunk and the calculated call will hit the pivot in a separate heap chunk. This will take some time in the users browser.




est

HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution

This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary.







est

DNS Resolver 9.9.9.9 Will Check Requests Against IBM Threat Database





est

Zyxel USG/UAG/ATP/VPN/NXC External DNS Requests

Zyxel USG/UAG/ATP/VPN/NXC series suffer from an issue where a DNS request can be made by an unauthenticated attacker to either spam a DNS service of a third party with requests that have a spoofed origin or probe whether domain names are present on the internal network behind the firewall.




est

TestSSL 3.0.1

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.




est

TestSSL 3.0.2

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.





est

Deutsche Telekom Hack Suspect Arrested At London Airport




est

Germany Urges Parents To Destroy Snooping Smartwatches










est

Wi-fEye Wireless Pentesting Tool 1.0 Beta

Wi-fEye is designed to help with network penetration testing. It allows the user to perform a number of powerful attack automatically including WEP/WPA cracking, session hijacking and more.




est

Mali lures angel investors to boost start-ups

Government minister Safia Boly outlines efforts to foster entrepreneurship




est

How Many Microsoft Products Can My Nonprofit Request from TechSoup?

https://blog.techsoup.org/posts/how-many-microsoft-products-can-nonprofits-request

Here is the short answer to the question of how many Microsoft products you can request: You can get 50 of each kind of product in a two-year period — but there are some exceptions.

 

See Microsoft products

What do you mean by "each kind of product"?

The Microsoft Donation Program divides products into categories called title groups. See the current list of 37. A title group contains products that serve essentially the same purpose, like PowerPoint and PowerPoint for Mac.

You can get products from 10 title groups in your two-year cycle.

When does this two-year cycle start and end? Is it the calendar year?

No. Your nonprofit has its own two-year cycle. Your first cycle started the day you requested your first Microsoft product through TechSoup. You can see when your current cycle ends on your Microsoft Donation Center page.

Outlook and PowerPoint are both title groups. Does that mean we can get 50 of each product?

That's right. They can be all the Windows version, all the Mac version, or a mixture of the two. And you will be able to request products from eight more title groups.

What are the exceptions you mentioned?

They have to do with servers. Microsoft offers two licensing models for its server products.

  • Core-based licensing. This licensing is based on the number of cores in the physical processors of your server machines. The product page on TechSoup will tell you whether the server uses this type of licensing. You can request up to 50 of these products from each title group, the same as desktop products. But you might have to request more than one product to fully license all the processors in your server.
  • Non-core-based licensing. You can request a total of five server products that do not use core-based licensing. They can be from a single title group or from different title groups, but the total cannot be more than five.

A lot of the title groups are for CALs and MLs. What are the limits for these?

You can get 50 from each title group.

CALs, or client access licenses, give you access to a server from a device like your desktop computer.

MLs, or management licenses, let your device be managed by a management server.

Where can I find out more?

This article goes into a lot more detail and gives examples of how the various allotments work together.