CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Account Takeover Using Password Reset
by Unknown
๐Ÿ‘1
#Analytics
#Infographics
Systematization of attacks on the perimeter of L2/L3 network equipment. Ver. 3.0.
Cross_Layer_Attacks.pdf
1.1 MB
#Research
"From IP to Transport and Beyond: Cross-Layer Attacks Against Applications", 2022.
Cyber Security Attack Vectors

๐Ÿ‘
#Attack
โค1๐Ÿ‘1
Forwarded from Cyber security intelligent program
โค1
Forwarded from Cyber security intelligent program
๐Ÿ”ฅPhpMyAdmin Setup is Accessible Without Authentication
1๏ธโƒฃRecon through shodan and censys
2๏ธโƒฃVisit all ips and fuzz them according to their running services.
3๏ธโƒฃwappalyzer showed php so sid0krypt used php.txt from here
4๏ธโƒฃphpMyAdmin/setup was accessible
Forwarded from Cyber security intelligent program
๐Ÿ’ฅUsing the bruteforce of directories, an endpoint was found: /phpmyadmin/scripts/setup.php

๐Ÿค™Thx @0x_rood
Forwarded from Cyber security intelligent program
๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅThe OWASSRF + TabShell exploit chain

This blog post shares the detail of two vulnerabilities :
OWASSRF(crowdstrike) & TabShell.

๐Ÿ“บDemo: TabShell Microsoft Exchange
Forwarded from Cyber security intelligent program
Forwarded from Cyber security intelligent program
Forwarded from Cyber security intelligent program
๐Ÿ’ฅNew Security Bulletin Zoom(3 LPE: CVE-2022-36926 + CVE-2022-36927, CVE-2022-36929 & CVE-2022-36930 )
Forwarded from Cyber security intelligent program
Forwarded from Cyber security intelligent program
Forwarded from Cyber security intelligent program
UnhookingPatch.zip
7.8 KB
๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅUnhookingPatch is a bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime

๐Ÿ”–Syscall instruction Unhooking(HalosGate)
Forwarded from Cyber security intelligent program
๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅvb2_mmap race with vb2_core_reqbufs leads to UAF

The following bug is in the vb2 subsystem, which is a subsystem reachable on typical desktop Linux systems with a webcam via V4L2 at /dev/video*. This subsystem can consequently be reached by an
unprivileged user in the video group (which is a common setup via
uaccess udev rules). This bug may also be reachable on Android in some SELinux contexts.

videobuf2 allows userland to register multiple different types of
buffers to back the
vb2_queue for streaming I/O, including memory mapping (via mmap), user pointers, and DMA buffers. In the vb2_mmap handler, the memory type of the associated backing store is verified outside the queue lock, which means a concurrent vb2_core_reqbufs
(reachable from VIDIOC_REQBUFS ioctl) can change the memory type before vb2_mmap completes.