CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
๐Ÿ”ฅNETGEAR Routers: A Playground for Hackers?
Overall, the security posture of custom binaries built by NETGEAR contained many vulnerabilities, largely due to the widespread usage of insecure C functions such as strcpy, strcat, sprintf, or from off-by-one errors. However, the majority of the binaries on the NETGEAR router were compiled with many protections in place, including stack canaries, non-executable stack (NX), position-independent code (PIE) and address layout randomization (ASLR) enabled. These protections made many of the vulnerabilities identified difficult to exploit on their own.

Content:
๐Ÿ’พ Summary
๐Ÿ’พ Advisories
๐Ÿ’พ Vulnerabilities
๐Ÿ’ฝ Telnet
๐Ÿ“€ PSV-2023-0008 โ€“ Telnet Default Account Privilege Escalation Breakout
๐Ÿ’ฝ Web Application
๐Ÿ“€ PSV-2022-???? โ€“ JSON Response Stack Data Leak
๐Ÿ’ฝ SOAP Service
๐Ÿ“€ PSV-2023-0009 โ€“ Write HTTP Response Stack Pointer Leak
๐Ÿ“€ PSV-2022-???? โ€“ SOAPAction Stack Buffer Overflow
๐Ÿ“€ PSV-2023-0010 โ€“ HTTP Body Off-By-One NULL Terminator Stack Canary Corruption
๐Ÿ“€ PSV-2023-0011 โ€“ HTTP Protocol Stack Buffer Overflow
๐Ÿ“€ PSV-2023-0012 โ€“ SOAP Parameters Stack Buffer Overflow
๐Ÿ’พ Conclusion
โšก1๐Ÿ‘1
๐Ÿ˜‰ Web Pentesting Roadmap for Success ๐Ÿ˜‰

Web pentesting is a process of finding and exploiting security vulnerabilities in web applications or websites to ensure their security. It involves gathering information about the target, identifying weaknesses, and providing recommendations for improvement.

๐Ÿš€Link:
bit.ly/Web-Pentesting-Roadmap

Share with Love๐Ÿ˜˜
๐Ÿ‘1
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
Malware is a type of software that is designed to cause harm to a computer or its users. It can be used to steal personal information, damage files, or even take control of a computer.

Read Full Article

https://trickypenguin.ink/what-is-malware-and-how-to-protect-against-malware-attacks/

#malware #botnets #torjan
โค5
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿ’ฅ PoC for CVE-2023-32233(tested under Ubuntu 23.04)

Once the PoC is started on a vulnerable system, it may leave that system in an unstable state with corrupted kernel memory. We strongly recommend to test the PoC on a dedicated system to avoid potential data corruptions.

Download: https://system32.ink/news-feed/p/367/
โค3
Especially when it comes to Bug Bounty hunting, reconnaissance is one of the most valuable things to do. There are still "easy winsโ€œ out there which can be found, if you have a good strategy when it comes to reconnaissance. 

In this Blogpost I want to explain, how I am normally performing reconnaissance during Pentests and for Bug Bounties.

Read Full Article
โคโ€๐Ÿ”ฅ3
Media is too big
VIEW IN TELEGRAM
How to save all post in private from public channel
Using bot
Post credit @its_me_dollar
@Deadlymalwarexpbot
โค1
g's hacker's ( its a bad day for me but โ€”โค๏ธ
โ€ผ๏ธHere we go again

Microsoft is scanning the inside of password-protected zip files for malware
read_more

#hacker_bano_chutiya_nhe ๐Ÿ˜ค
#fuck_Microsoft ๐Ÿ˜‚
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
โค4
This media is not supported in your browser
VIEW IN TELEGRAM
โค10โคโ€๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿš€Google Dorks: Learn to Hack Anyone's Account with Google๐Ÿš€

โœ…What you'll learn?
โ€ข Complete understanding of Google Dorks
โ€ข How to find Vulnerabilities
โ€ข How to find anyone's Username & Password
โ€ข How to do Google search like a Hacker

๐Ÿ”—Link:
http://bit.ly/GoogleDorksForHacking

Share with Love๐Ÿ˜˜
web2shell

A Python program used to automate converting webshells into reverse shells. If you regularly do CTF, HTB, or red teaming you've probably spent a good chunk of time testing payloads to convert a webshell into a reverse shell. This tool aims to simplify this process.
CVE-2023-32243 | wordpress

Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation

usage: exploit.py [-h] -u URL -p PASSWORD [-usr USERNAME]

Download Exploit
โค2
gg's hacker's ( I love you โ€”โค๏ธ
โ€ผ๏ธHere we go again
here we go again ๐ŸŽ‰
#OSINT

1โ‚พ
Visual Ping web page monitoring service,
helps to
track of changes on any particular website.
( hourly/everyday )

2โ‚พ
All the internet combines results from
different search engines and social media.

3โ‚พ izito searches and combines all Search Engines!
Yahoo, Microsoft Bing, YouTube, Wikipedia, Entireweb etc...

#exploit
1. CVE-2023-1586:
Avast Anti-Virus privileged arbitrary file create on virus restore

and as always #hacker_bano_chutiya_nhe ๐Ÿ˜๐Ÿ˜
โšก2
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
OEBuilder | Hack Using Excel And Doc

OEBuilder uunique assembly, crypter and macro generator for stitching your bootloader into the doc file. The software is very convenient and understandable.

Features:

*Fake Error
*UAC Bypass
*Add password to doc
*add text
*USG
*DOC
*XLS
*Silent add ons
A new blog on OWASP ZAP Tool

A perfect tool for beginners to start their web application security testing journey

Here is the links to that blog:

https://techofide.com/blogs/owasp-zap-a-powerful-web-application-security-testing-tool/

Join our group for more such Cyber Security content:

t.me/ethicalhackingtechofide
๐Ÿ‘1