cookie

Sizning foydalanuvchi tajribangizni yaxshilash uchun cookie-lardan foydalanamiz. Barchasini qabul qilingยป, bosing, cookie-lardan foydalanilishiga rozilik bildirishingiz talab qilinadi.

avatar

๐—ž๐—ฒ๐˜๐—ฎ๐—ฝ๐—ฎ๐—ป๐—ด ๐—š๐—ฟ๐—ฒ๐˜† ๐—›๐—ฎ๐˜ ๐—ง๐—ฒ๐—ฎ๐—บ โˆ€

"Ketapang Gray Hat Team is one of the Indonesian hackers who is active in various for" Since 2021 INSTAGRAM:@ketapang_cyber_team TIKTOK:@ketapanggreyhatteam #Freepalestine #Indonesia

Ko'proq ko'rsatish
Reklama postlari
3 398
Obunachilar
+1024 soatlar
+1917 kunlar
+61730 kunlar

Ma'lumot yuklanmoqda...

Obunachilar o'sish tezligi

Ma'lumot yuklanmoqda...

Repost fromย Esteem Restoration Eagle
Hacked By Esteem Restoration Eagle Site : https://manly.com.bd/ Mirror : https://haxor.id/archive/mirror/202663 Message : this is the last time to mess up the Bangladesh website, and I'm just testing the security of the Bangladesh website to strengthen its security #EsteemRestorationEagle #IslamicCyberTeam
Hammasini ko'rsatish...
Repost fromย Esteem Restoration Eagle
Photo unavailableShow in Telegram
Hacked By Esteem Restoration Eagle Sorry Bangladesh, please tighten your website security again Site : https://poe.com.bd/ mirorr : https://zone-xsec.com/mirror/id/664648 #EsteemRestorationEagle #IslamicCyberTeam
Hammasini ko'rsatish...
Repost fromย HACKTIVIST KALTENG [H.K]
Hacked by Hacktivist Kalteng o\/v1","methods":["GET"],"endpoints":[{"methods":["GET"],"args":[]}]},"\/aioseo\/v1\/tags":{"namespace":"aioseo\/v1","methods":["GET"],"endpoints":[{"methods":["GET"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/tags"}]}},"\/aioseo\/v1\/search-statistics\/url\/auth":{"namespace":"aioseo\/v1","methods":["GET"],"endpoints":[{"methods":["GET"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/search-statistics\/url\/auth"}]}},"\/aioseo\/v1\/search-statistics\/url\/reauth":{"namespace":"aioseo\/v1","methods":["GET"],"endpoints":[{"methods":["GET"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/search-statistics\/url\/reauth"}]}},"\/aioseo\/v1\/htaccess":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/htaccess"}]}},"\/aioseo\/v1\/post\/(?P<postId>[\\d]+)\/disable-primary-term-education":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}]},"\/aioseo\/v1\/post\/(?P<postId>[\\d]+)\/disable-link-format-education":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}]},"\/aioseo\/v1\/post\/(?P<postId>[\\d]+)\/update-internal-link-count":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}]},"\/aioseo\/v1\/post\/(?P<postId>[\\d]+)\/process-content":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}]},"\/aioseo\/v1\/posts-list\/load-details-column":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/posts-list\/load-details-column"}]}},"\/aioseo\/v1\/posts-list\/update-details-column":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/posts-list\/update-details-column"}]}},"\/aioseo\/v1\/terms-list\/load-details-column":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/terms-list\/load-details-column"}]}},"\/aioseo\/v1\/terms-list\/update-details-column":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/terms-list\/update-details-column"}]}},"\/aioseo\/v1\/keyphrases":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/keyphrases"}]}},"\/aioseo\/v1\/analyze":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/analyze"}]}},"\/aioseo\/v1\/analyze-headline":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/analyze-headline"}]}},"\/aioseo\/v1\/analyze-headline\/delete":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/analyze-headline\/delete"}]}},"\/aioseo\/v1\/analyze\/delete-site":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/analyze\/delete-site"}]}},"\/aioseo\/v1\/clear-log":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_links":{"self":[{"href":"https:\/\/dlh.kotimkab.go.id\/wp-json\/aioseo\/v1\/clear-log"}]}},"\/aioseo\/v1\/connect":{"namespace":"aioseo\/v1","methods":["POST"],"endpoints":[{"methods":["POST"],"args":[]}],"_link
Hammasini ko'rsatish...
Repost fromย HACKTIVIST KALTENG [H.K]
Hacked by Hacktivist Kalteng Site:dlh.kotimkab.go.id
Host is up (0.088s latency). Not shown: 992 filtered tcp ports (no-response), 2 filtered tcp ports (host-unreach) PORT     STATE  SERVICE 53/tcp   open   domain 80/tcp   open   http |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug) |_http-csrf: Couldn't find any CSRF vulnerabilities. 113/tcp  closed ident 443/tcp  open   https | http-vuln-cve2011-3192: |   VULNERABLE: |   Apache byterange filter DoS |     State: VULNERABLE |     IDs:  CVE:CVE-2011-3192  BID:49303 |       The Apache web server is vulnerable to a denial of service attack when numerous |       overlapping byte ranges are requested. |     Disclosure date: 2011-08-19 |     References: |       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192 |       https://www.securityfocus.com/bid/49303 |       https://www.tenable.com/plugins/nessus/55976 |_      https://seclists.org/fulldisclosure/2011/Aug/175 |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. 888/tcp  open   accessbuilder 5432/tcp open   postgresql |_ssl-ccs-injection: No reply from server (TIMEOUT)
Hammasini ko'rsatish...
CVE - CVE-2011-3192

The mission of the CVEยฎ Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

Boshqa reja tanlang

Joriy rejangiz faqat 5 ta kanal uchun analitika imkoniyatini beradi. Ko'proq olish uchun, iltimos, boshqa reja tanlang.