@Phantasm_Lab
2.54K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from @Phantasm_Lab
QRLJacking - A New Social Engineering Attack Vector

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which results in session hijacking.

https://github.com/OWASP/QRLJacking

🕴🏼 @PhantasmLab
Glify - Visual is in our DNA

Gliffy online tools power visual communication and collaboration.

https://www.gliffy.com/

🕴🏼 @PhantasmLab
30º Hangout - Pentest, Bug Bounty e muito 0day

https://www.youtube.com/watch?v=LwGPHcTnWn4

🕴🏻 @Phantasm_Lab
Forwarded from MUNDO INFORMATICA
Cookie-based SQL Injection

Injecting malicious code in cookie: Unlike other parameters, cookies are not supposed to be handled by users. Outside of session cookies which are (usually) random, cookies may contain data in clear or encoded in hexadecimal, base64, hashes (MD5, SHA1), serialized information. If we can determine the encoding used, we will attempt to inject SQL commands.

https://resources.infosecinstitute.com/cookie-based-sql-injection/#gref

🕴🏼 @Phantasm_Lab
Honeytrap is an extensible and opensource system for running, monitoring and managing honeypots.

To start using Honeytrap: See our documentation on docs.honeytrap.io.

https://github.com/honeytrap/honeytrap

🕴🏼 @Phantasm_Lab