CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Cross_Layer_Attacks.pdf
1.1 MB
#Research
"From IP to Transport and Beyond: Cross-Layer Attacks Against Applications", 2022.
Cyber Security Attack Vectors

👁
#Attack
1👍1
Forwarded from Cyber security intelligent program
1
Forwarded from Cyber security intelligent program
🔥PhpMyAdmin Setup is Accessible Without Authentication
1️⃣Recon through shodan and censys
2️⃣Visit all ips and fuzz them according to their running services.
3️⃣wappalyzer showed php so sid0krypt used php.txt from here
4️⃣phpMyAdmin/setup was accessible
Forwarded from Cyber security intelligent program
💥Using the bruteforce of directories, an endpoint was found: /phpmyadmin/scripts/setup.php

🤙Thx @0x_rood
Forwarded from Cyber security intelligent program
🔥🔥🔥The OWASSRF + TabShell exploit chain

This blog post shares the detail of two vulnerabilities :
OWASSRF(crowdstrike) & TabShell.

📺Demo: TabShell Microsoft Exchange
Forwarded from Cyber security intelligent program
Forwarded from Cyber security intelligent program
Forwarded from Cyber security intelligent program
💥New Security Bulletin Zoom(3 LPE: CVE-2022-36926 + CVE-2022-36927, CVE-2022-36929 & CVE-2022-36930 )
Forwarded from Cyber security intelligent program
Forwarded from Cyber security intelligent program
Forwarded from Cyber security intelligent program
UnhookingPatch.zip
7.8 KB
🔥🔥🔥UnhookingPatch is a bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime

🔖Syscall instruction Unhooking(HalosGate)
Forwarded from Cyber security intelligent program
🔥🔥🔥vb2_mmap race with vb2_core_reqbufs leads to UAF

The following bug is in the vb2 subsystem, which is a subsystem reachable on typical desktop Linux systems with a webcam via V4L2 at /dev/video*. This subsystem can consequently be reached by an
unprivileged user in the video group (which is a common setup via
uaccess udev rules). This bug may also be reachable on Android in some SELinux contexts.

videobuf2 allows userland to register multiple different types of
buffers to back the
vb2_queue for streaming I/O, including memory mapping (via mmap), user pointers, and DMA buffers. In the vb2_mmap handler, the memory type of the associated backing store is verified outside the queue lock, which means a concurrent vb2_core_reqbufs
(reachable from VIDIOC_REQBUFS ioctl) can change the memory type before vb2_mmap completes.
Forwarded from Cyber security intelligent program
mmap_reqbuf_race.c
3.7 KB
Forwarded from Deadly malware xp
aws_sec_incident_resp.pdf
749.1 KB
#Cloud_Security
"AWS Security Incident Response Guide", 2022.
Forwarded from Deadly malware xp
#exploit
1. The OWASSRF + TabShell exploit chain
https://blog.viettelcybersecurity.com/tabshell-owassrf

2. CVE-2022-3515/CVE-2022-47629:
Integer overflow bug Libksba library (x.509)
https://github.com/elttam/publications/blob/master/writeups/CVE-2022-47629.md

3. CVE-2022-44877:
Centos Web Panel 7 Unauthenticated RCE
https://github.com/numanturle/CVE-2022-44877
👍1