logo
  • About
  • Contact
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • MISCONFIGURED WBSC SERVER LEAKS THOUSANDS OF PASSPORTS
  • Menorah Malware: APT34’s Latest Cyberweapon Unmasked by Trend Micro
  • Diverse threat intelligence key to cyberdefense against nation-state attacks
  • Malicious ad served inside Bing’s AI chatbot
  • US State Department Says 60,000 Emails Taken in Alleged Chinese Hack

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-41691 (woocommerce_pensopay) 29 September 2023
  • CVE-2023-43739 (online_book_store_project) 28 September 2023
  • CVE-2023-43014 (asset_management_system) 28 September 2023
  • CVE-2023-43013 (asset_management_system) 28 September 2023
  • CVE-2023-4316 (zod) 28 September 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Spartan: Recon Automation

Posted on 21 February 2020

From securityonline.info

Features

  •  Subdomain Scan Using Aquatone & Sublist3r
  •  Httprob for only Live sites
  •  Masscan for open ports
  •  Identifing CMS using CMSeeK
  •  Grabing URL’s from waybackMachine
  •  ScreenShot using Aquatone
  •  Brute forcing directories and files using Dirsearch

Read more…

Posted in News

Post navigation

Previous post: DOD DISA discloses data breach
Next post: KILLSHOT – A penetration testing framework, information gathering tool & vulnerability scanner
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.