Weekly Shaarli
Week 40 (September 30, 2019)
DNS & IP Tools provide tactical intelligence to Security Operations (SOCS). Penetration Testers use the tools to map the attack surface of a target. Blue teams benefit from quickly identifying areas of security weakness and during incident response. Collect information about IP Addresses, Networks, Web Pages and DNS records.
The world biggest directory of online surveillance security cameras. Select a country to watch live street, traffic, parking, office, road, beach, earth online webcams. Now you can search live web cams around the world. You can find here Axis, Panasonic, Linksys, Sony, TPLink, Foscam and a lot of other network video cams available online without a password. Mozilla Firefox browser is recommended to watch network cameras.
The First Responder Kit’s free Power BI Dashboard gives you a fast overview of how your SQL Server is performing. You can trend your throughput by time, see how hard SQL Server was working during those times, and see what sp_BlitzFirst recorded about various performance issues like blocking, backups, and poison waits.
We analyse some of the most popular IP Geolocation APIs and provide code examples, cost, rate limits and everything else you need to make a decision.
To get the calling ip addresses’ data
https://api.ipdata.co?api-key=test
To lookup a specific ip address
https://api.ipdata.co/1.1.1.1?api-key=test
You can also select a specific field, for example the country_name alone
https://api.ipdata.co/1.1.1.1/country_name?api-key=test
Or the is_eu field
https://api.ipdata.co/1.1.1.1/is_eu?api-key=test
more...
IPInfo.io
IP-API.com
ipapi.co
ipstack.com
db-ip.com
ipify.org
ipgeolocationapi.com
Des chercheurs ont trouvé des failles permettant d’accéder aux données chiffrées nativement dans un fichier PDF. Malheureusement, pour colmater ces failles, il faudrait modifier le standard de fond en comble.
Le PDF est un format de document extrêmement populaire, y compris pour manipuler des données sensibles. En effet, ce standard propose un chiffrement natif fort pratique, censé rendre les données inviolables. Pour l’activer, il suffit généralement de définir un mot de passe au niveau du logiciel PDF. Mais ce chiffrement est loin d’être inviolable, comme vient de le montrer un groupe de chercheurs des universités Ruhr-Bochum et Munster. Ces experts ont trouvé deux attaques baptisées « PDFex », permettant de faire fuiter les informations confidentielles d’un fichier PDF chiffré.