CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
#exploit
1. Workaround for CVE-2022-41923: Privilege Management Vulnerability
https://github.com/grails/GSSC-CVE-2022-41923

2. CVE-2022-32060:
Snipe-IT v.6.0.2 - arbitrary file upload
https://github.com/bypazs/CVE-2022-32060

3. CVE-2022-45472:
DOM Based XSS
https://github.com/nicbrinkley/CVE-2022-45472
OpenDoc.pdf
1.1 MB
#Threat_Research
"Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures", 2022.
SARA.pdf
1.1 MB
#Research
"SARA: Secure Android Remote Authorization", 2022.
]-> Repo: https://github.com/purseclab/SARA-Secure-Android-Remote-Authorization
mas_6-1.pdf
3.9 MB
#Malware_analysis
Malware Analysis Series (MAS) - Article 6, November/24/2022, rev: A.1.
Defending_nginx (1).pdf
8.9 MB
#hardening
"Defending against automatization using NGINX", 2022.

]-> Nginx Bad Bot and User-Agent Blocker, Spam Referrer Blocker, Anti DDOS, Bad IP Blocker, Wordpress Theme Detector Blocker:
https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
Nessie.pdf
747.9 KB
#Research
"Nessie: Automatically Testing JavaScript APIs with Asynchronous Callbacks", 2022.
]-> https://zenodo.org/record/5874851#.Y4Gx7aSOFSA
#exploit
1. CVE-2022-32898:
ANE_ProgramCreate() multiple kernel memory corruption
https://0x36.github.io/CVE-2022-32898

2. CVE-2022-43781:
Command injection vulnerability using environment variables in Bitbucket Server/Data Center
https://petrusviet.medium.com/cve-2022-43781-32bc29de8960

3. CVE-2022-38374:
XSS in Fortinet FortiADC 7.0.0 - 7.0.2, 6.2.0 - 6.2.4
https://github.com/azhurtanov/CVE-2022-38374
Nimjector.pdf
4.9 MB
#Offensive_security
"Understanding and Re-creating Process Injection Techniques through Nimjector", 2022.
]-> https://github.com/cybernomad1/NimJection
💥Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice

Nighthawk is a mature and advanced commercial C2 framework for lawful red team operations that is specifically built for detection evasion, and it does this well. While Proofpoint researchers are not aware of adoption of Nighthawk in the wild by attributed threat actors, it would be incorrect and dangerous to assume that this tool will never be appropriated by threat actors with a variety of intexfnts and purposes.

🔥🔥🔥PoC of the removed registered LdrDllNotification for your enjoyment.

🔥🔥🔥PoC for utilizing RtlQueueWorkItem to load libraries
🔥Vulnerabilities in BMC Firmware Affect OT/IoT Device Security(part1)

By abusing these vulnerabilities, an unauthenticated attacker may achieve RCE with root privileges on the BMC, completely compromising it and gaining control of the managed host. During our research, we uncovered other vulnerabilities whose patching is still in progress and thus cannot be disclosed as of yet; those will be covered in a follow-up blog post.

Our discussion starts with an introduction to BMCs and an illustration of the vulnerabilities discovered. We will then provide an example of how an attacker can abuse these issues to ultimately compromise the device, and conclude with remediations that asset owners can implement.