CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
723 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from ๐ˆ๐๐ƒ๐ˆ๐€๐ ๐‚๐˜๐๐„๐‘ ๐…๐Ž๐‘๐‚๐„
Gov. Of Bangladesh National E-mail System Compromised!


#IndianCyberForce
#OpBDPedophiles
โคโ€๐Ÿ”ฅ11โšก2๐Ÿ‘1๐Ÿฅฐ1
๐Ÿ–ฅ https://system32.ink/nginx-ingress-kubernetes-cve-2024-7646-poc/ ๐Ÿ–ฅ

๐Ÿ–ฅ NGINX-Ingress Kubernetes CVE-2024-7646 PoC ๐Ÿป


๐ŸšจA security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the networking.k8s.io or extensions API group) can bypass ๐Ÿ–ฅ annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.๐Ÿ˜ต

๐Ÿ“กThe issue allows an attacker to access the Kubernetes Service Account (SA) token by exploiting improper input validation in the nginx.ingress.kubernetes.io/auth-tls-verify-client annotation.๐Ÿ’ป
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Prapatti ็ˆชใ„šๅ‡ าœ
๐Ÿ˜’TRYHACKME๐Ÿ˜’ PREMIUM AVAILABLE ( PAID ) โšก๏ธ

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ”ฃ๐Ÿค“ ONE MONTH : 250 RUPEES (๐Ÿ’ฒCHECKOUT) ๐Ÿค‘

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ” ๐Ÿ”ค @ProtocolNick โœˆ๏ธ IF YOU NEED

1๏ธโƒฃ0๏ธโƒฃ0๏ธโƒฃ๐Ÿ”ฃ TRUSTED
1๏ธโƒฃ0๏ธโƒฃ0๏ธโƒฃ๐Ÿ”ฃ MONEY BACK GUARANTEE
Please open Telegram to view this post
VIEW IN TELEGRAM
โšกHappy RakshaBandhan
โคโ€๐Ÿ”ฅ22โค9๐Ÿ—ฟ5๐Ÿ‘2๐Ÿฅฐ2๐Ÿ’”2๐Ÿ‘Œ1
Forwarded from WRICK [ ๐‡๐ ]
HOSTINGER
VPS โœ”๏ธ
HOSTINGS โœ”๏ธ
CPANEL HOSTINGS โœ”๏ธ
RDPS โœ”๏ธ
DOMAINS โœ”๏ธ
WORDPRESS HOSTINGS โœ”๏ธ
RESELLER HOSTINGS โœ”๏ธ

๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค
๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค

CHEAP PRICED
85% OFF ๐Ÿ’ผ
PURCHASE HERE
PURCHASE HERE
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ’”2
๐Ÿ–ฅ https://system32.ink/best-restaurant-menu-by-pricelisto-wordpress-plugin-cve-2024-38793-exploit/ ๐Ÿ–ฅ

โ„น๏ธ Best Restaurant Menu by PriceListo Wordpress Plugin CVE-2024-38793 Exploit ๐Ÿดโ€โ˜ ๏ธ


๐Ÿ“Œ This is a proof of concept exploit for the vulnerability CVE-2024-38793, an SQL injection vulnerability for versions of the WordPress plugin Best Restaurant Menu a.k.a Great Restaurant Menu WP before 1.4.2.

๐Ÿ†˜The vulnerability occurs because of a lack on input sanitization on the groups argument when using the brm_restaurant_menu shortcode.

โœ๏ธNote: This does require the credentials of a user with at least Contributor level privileges.

๐ŸŸฅThe code will attempt to grab the username and password hashes from the WordPress users table.๐Ÿ’ป
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘4
๐Ÿ–ฅ https://system32.ink/fastadmin-retrieve-db-details-directory-traversal-cve-2024-7928-exploit/ ๐Ÿ–ฅ

๐Ÿ–ฅ FastAdmin Retrieve DB Details Directory Traversal CVE-2024-7928 Exploit ๐Ÿ’ป


โ„น๏ธ A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal ๐Ÿ–ฅ. The attack may be launched remotely. ๐Ÿ–ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in the widget
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ6โค3โšก1๐Ÿ‘Œ1
Spy Selling confidential Information Of ISRO
๐Ÿคฃ68๐Ÿ—ฟ4๐Ÿ‘2โค1๐Ÿ”ฅ1๐Ÿ†1
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #10 is out now.

Highlights: 4 blogs, 7 external reading, 4 videos, 1 podcast episodes, 1 tool updates, 3 awesome tools and many more.

https://osintambition.substack.com/p/wednesday-updates-10

Don't forget to subscribe to get all new posts directly in your inbox.

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ‘1
๐Ÿ–ฅ https://system32.ink/necroword-embed-payload-using-undetect-macros/ ๐Ÿ–ฅ

๐Ÿ’ปNecroWord - Embed Payload Using Undetect Macros๐Ÿ”ฉ


โ„น๏ธNecroWord โ€” an easy way to embed a payload using undetect macros! ๐Ÿ˜€

๐Ÿค” What is it?

โžก๏ธโ€” In simple words - you can create an undetect infected .doc document ๐Ÿ“„

โœ๏ธHow to use ?

โžก๏ธโ€ข Generate payload gird (image file with generated code)

๐ŸŸฃโ€ข Set download link to your payload-grid

โžก๏ธโ€ข Generate your infected document!

๐Ÿ†˜Attention! โ€” This is not a CVE | We condemn the use of software for illegal purposes. All responsibility for use lies with you
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1
This media is not supported in your browser
VIEW IN TELEGRAM
India is celebrating today its first-ever
National Space Day to commemorate the successful landing of Chandrayaan-3 on the south polar region of Moon.
๐ŸŽ‰8โค5โšก1
๐Ÿ–ฅ https://system32.ink/litespeed-cache-privilege-escalation-cve-2024-28000-exploit/ ๐Ÿ–ฅ

๐Ÿ“ก LiteSpeed Cache Privilege Escalation CVE-2024-28000 Exploit ๐Ÿ’ป


โ„น๏ธ The LiteSpeed Cache plugin's user simulation feature is protected by a weak security hash generated using predictable values. An attacker can exploit this vulnerability by brute-forcing the security hash and passing it in a cookie along with a targeted user ID. If successful, the attacker can escalate their privileges to that of an Administrator. ๐Ÿ–ฅ

๐Ÿ“ŒAffected Versions
LiteSpeed Cache plugin versions prior to 6.4 are vulnerable.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค2
๐Ÿ–ฅ https://system32.ink/xsslite-stealer/ ๐Ÿ–ฅ

๐ŸŽฎ XSSLite Stealer ๐Ÿป


๐Ÿ’ป XSSLite is a well-obfuscated piece of malicious software that uses several anti-analysis and anti-detection mechanisms. For example, this stealer checks whether it is launched on a virtual machine by looking for infrastructures related to Hyper-V and VMware. It also boasts some anti-debugging features.

๐Ÿ“กXSSLite uses the DLL side-loading technique to infiltrate machines. In other words, it utilizes the Windows DLL search order mechanism to leverage a legitimate program that executes the malicious payload. Following successful installation, the malicious program begins collecting relevant device data.

๐Ÿ†˜XSSLite can extract and exfiltrate data from Chromium-based browsers. Typically, stealers target browsing and search engine histories, Internet cookies, log-in credentials (usernames/passwords), personally identifiable details, credit card numbers, and other sensitive information.

โ„น๏ธAccording to XSSLite's promotional material, it can obtain data from all types of browser extensions. This could include plug-ins related to cloud storage, password management, 2FA/MFA (Two/Multi-Factor Authentication), cryptocurrency platforms, etc.

๐Ÿ“ขFurthermore, this malware can exfiltrate (download) victims' desktop files. The program also aims to steal cryptocurrency wallets. Additionally, the stealer has keylogging abilities, i.e., it can record keystrokes (keyboard input).

โžก๏ธIt is pertinent to mention that malware developers commonly improve upon their creations and methodologies; therefore, potential future iterations of XSSLite could have additional/different capabilities.
Please open Telegram to view this post
VIEW IN TELEGRAM
โšก2๐Ÿ‘1
Bayraktar Akinci Combat Drones Purchased By Porkistan From Turkey ๐Ÿฆƒ

Hacked By PKG

https://www.instagram.com/reel/C_F5b9zScB7/?igsh=MTA4MXoxenQyN2IzYg==
โค8๐Ÿ”ฅ3โšก2๐Ÿ‘1