CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
We are hiring !  Information Security candidates

It is a full time job at associate level based out of Pune/Mumbai/Bangalore/Gurugram.
Hybrid work model. Opportunity to work with international clients.

7 - 9 years of work experience in Information Security, Internal Audit, ISO 27001, Risk Management , IT Security, Systems Audit, Consulting, Network security, Quality systems audit
Candidates with ISO 27001 LA, CISA ,MBA IT certificates would be preferred.
Must have good communication skills.
Must be familiar with Information Security domains like Policies and Procedures, VAPT, Risk Assessment, IS Audits, Network Security, Access control
Knowledge of current trends in Information Technology.
Knowledge in information security assessments.
Knowledge of Security requirements like ISO/IEC 27001 or SOC1, SOC2.
How an Information Security Associate, you will be responsible for

Client interaction for information gathering.
Assisting team members in Analysing, implementing, and managing the information security for our client(s).
Policy and Procedure Preparation.
Involvement in information security performance reviews and internal audits of client, etc.

Please share your CV to

careers_csecurity.in@capgemini.com

Fwded as received
โค1๐Ÿ‘1
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
Forwarded from ELEMENT-/-11
Pakistan's Economics...Moody.pdf
1.7 MB
๐˜พ๐™๐™š๐™˜๐™ ๐™ค๐™ช๐™ฉ ๐™‰๐™š๐™ฌ ๐™„๐˜ฟ๐™Š๐™ ๐™๐™š๐™จ๐™ฉ-๐˜พ๐™–๐™จ๐™š๐™จ

๐™‡๐™ž๐™ฃ๐™ :https://twitter.com/thecybertix/status/1676464147855470593?t=YLFOU7Rw4bqo2dzGQZV77w&s=19
๐˜ฟ๐™ค ๐™ฎ๐™ค๐™ช ๐™ ๐™ฃ๐™ค๐™ฌ ๐™’๐™๐™–๐™ฉ ๐™ž๐™จ " ๐˜ฟ๐™Š๐™ˆ ๐˜พ๐™ก๐™ค๐™—๐™—๐™š๐™ง๐™ž๐™ฃ๐™œ" ? ๐Ÿค”๐Ÿค”

๐˜พ๐™๐™š๐™˜๐™  ๐™ฉ๐™๐™ž๐™จ ๐™Š๐™ช๐™ฉ:
https://youtube.com/shorts/rysHaowv6Bk?feature=share
๐Ÿ’ฅGeoServer SQL Injection Vulnerability Analysis (CVE-2023-25157)

SQL Injection Vulnerabilities have been found with:
๐Ÿ’พ PropertyIsLike filter, when used with a String field and any database DataStore, or with a PostGIS DataStore with encode functions enabled
๐Ÿ’พ strEndsWith function, when used with a PostGIS DataStore with encode functions enabled
๐Ÿ’พ strStartsWith function, when used with a PostGIS DataStore with encode functions enabled
๐Ÿ’พ FeatureId filter, when used with any database table having a String primary key column and when prepared statements are disabled
๐Ÿ’พ jsonArrayContains function, when used with a String or JSON field and with a PostGIS or Oracle DataStore (GeoServer 2.22.0+ only)
๐Ÿ’พ DWithin filter, when used with an Oracle DataStore


๐Ÿ”–CVE-2023-25157 - GeoServer SQL Injection - PoC

Usage:
python3 CVE-2023-25157.py <URL>
System32.ink on The maintenance

We will be start it after 6 days
๐Ÿ‘4
๐Ÿ’ฅRCE in GitLab's CLI tool

Attack scenario:
1๏ธโƒฃAttacker creates a repository. They create a branch named "@|calc".
2๏ธโƒฃTo make the attack more convincing, they set this branch as the default branch.
3๏ธโƒฃVictim clones the repository on their machine.
4๏ธโƒฃVictim tries to create an MR using glab mr create --web
5๏ธโƒฃThe following command is run: cmd.exe /c "start https://gitlab.com/test-user/test-repo/-/merge_requests/new?merge_request[title]=%s^&amp;merge_request[description]=%s^&amp;merge_request[source_branch]=%s^&amp;merge_request[target_branch]=@|calc^&amp;merge_request[source_project_id]=%d^&amp;merge_request[target_project_id]=%d".
6๏ธโƒฃThe pipe character allows to break out of the URL context and launch calc.