Thank You Guys, So much for joining the Meet 🌿🍁
Special thanks 👍 To Our Team:
1. twitter.com/Anukulhexx
2. twitter.com/hack_learners
3. twitter.com/radhasec
4. twitter.com/TecholicKamal
5. twitter.com/RajNamdevv
For handling this Meet
Special thanks 👍 To Our Team:
1. twitter.com/Anukulhexx
2. twitter.com/hack_learners
3. twitter.com/radhasec
4. twitter.com/TecholicKamal
5. twitter.com/RajNamdevv
For handling this Meet
❤9👍1
PART 1
🍏 Let's Exploit the Nodejs Application :
https://x.com/vulncure/status/1736816422217527727?s=20
🍏 Let's Exploit the Nodejs Application :
https://x.com/vulncure/status/1736816422217527727?s=20
🔥7👍4👌1
PART 2 ⤵️
🍏 Exploit Nodejs Application To RCE
In Part 1, We talked about the Nodejs global process that can used to get better control over system interactions
We sawn that Nodejs Application wouldn't have sanitized the eval() .
Well, Now we'll deal with the file system of instance running Nodejs Application
Read More :
https://x.com/vulncure/status/1737169125267415403?s=20
🍏 Exploit Nodejs Application To RCE
In Part 1, We talked about the Nodejs global process that can used to get better control over system interactions
We sawn that Nodejs Application wouldn't have sanitized the eval() .
Well, Now we'll deal with the file system of instance running Nodejs Application
Read More :
https://x.com/vulncure/status/1737169125267415403?s=20
❤6😱1
🎉 Happy New Year Guys 🎊
Hope you're doing well and if not, you have new year to start with new mindset and methodology to Succeed
All the Best 🥳
Hope you're doing well and if not, you have new year to start with new mindset and methodology to Succeed
All the Best 🥳
❤23🎉4👍2👏2👀1
IDOR.pdf
78.5 KB
🔥31👍7⚡2👀1
2FA Bypass.pdf
301.4 KB
🔥25👍4❤3😁1
reset pass checklist.pdf
97.4 KB
❤14🔥6👍3🕊1
🚨Bounty Tips Collected From Twitter🚨.pdf
225.9 KB
❤🔥8🔥5👍4❤2👌2
PART - #1 🕵️♂️🛠
Let's Crack The Jenkins Instance 🔓
https://x.com/vulncure/status/1743241088968638513?s=20
Let's Crack The Jenkins Instance 🔓
https://x.com/vulncure/status/1743241088968638513?s=20
👍7🔥3⚡2🌭1
Some Shodan Dorks that might useful in Bug Bounty.
1. org:"http://target. com"
2. http.status:"<status_code>"
3. product:"<Product_Name>"
4. port:<Port_Number> “Service_Message”
5. port:<Port_Number> “Service_Name”
6. http.component:"<Component_Name>"
7. http.component_category:"<Component_Category>
8. http.waf:"<firewall_name>"
9. http.html:"<Name>"
10. http.title:"<Title_Name>"
11. ssl.alpn:"<Protocol>"
12. http.favicon.hash:"<Favicon_Hash>"
13. net:"<Net_Range>" (for e.g. 104.16.100.52/32)
14. http://ssl.cert.subject.cn:"<http://Domain .com>"
15. asn:"<ASnumber>"
16. hostname:"<hosthame>"
17. ip:"<IP_Address>"
18. all:"<Keyword>"
19. “Set-Cookie: phpMyAdmin”
20. “Set-Cookie: lang="
21. “Set-Cookie: PHPSESSID"
22. “Set-Cookie: webvpn”
23. “Set-Cookie:webvpnlogin=1"
24. “Set-Cookie:webvpnLang=en”
25. “Set-Cookie: mongo-express="
26. “Set-Cookie: user_id="
27. “Set-Cookie: phpMyAdmin="
28. “Set-Cookie: _gitlab_session”
29. “X-elastic-product: Elasticsearch”
30. “x-drupal-cache”
31. “access-control-allow-origin”
32. “WWW-Authenticate”
33. “X-Magento-Cache-Debug”
34. “kbn-name: kibana”
1. org:"http://target. com"
2. http.status:"<status_code>"
3. product:"<Product_Name>"
4. port:<Port_Number> “Service_Message”
5. port:<Port_Number> “Service_Name”
6. http.component:"<Component_Name>"
7. http.component_category:"<Component_Category>
8. http.waf:"<firewall_name>"
9. http.html:"<Name>"
10. http.title:"<Title_Name>"
11. ssl.alpn:"<Protocol>"
12. http.favicon.hash:"<Favicon_Hash>"
13. net:"<Net_Range>" (for e.g. 104.16.100.52/32)
14. http://ssl.cert.subject.cn:"<http://Domain .com>"
15. asn:"<ASnumber>"
16. hostname:"<hosthame>"
17. ip:"<IP_Address>"
18. all:"<Keyword>"
19. “Set-Cookie: phpMyAdmin”
20. “Set-Cookie: lang="
21. “Set-Cookie: PHPSESSID"
22. “Set-Cookie: webvpn”
23. “Set-Cookie:webvpnlogin=1"
24. “Set-Cookie:webvpnLang=en”
25. “Set-Cookie: mongo-express="
26. “Set-Cookie: user_id="
27. “Set-Cookie: phpMyAdmin="
28. “Set-Cookie: _gitlab_session”
29. “X-elastic-product: Elasticsearch”
30. “x-drupal-cache”
31. “access-control-allow-origin”
32. “WWW-Authenticate”
33. “X-Magento-Cache-Debug”
34. “kbn-name: kibana”
🔥17❤5👍3👌3⚡2
Bugbounty Reports in Threads 🧵
Bug : HTML sanitizer that allows an attacker to inject arbitrary unsafe HTML into emails, potentially lead to account compromise for hey .com's users who view the malicious emails
Type: XSS
Company: Basecamp
Siverity: Critical (9 ~ 10)
Bounty: $5,000
Dive into the details 🧵:📷
https://x.com/vulncure/status/1744002060016591097?s=20
Bug : HTML sanitizer that allows an attacker to inject arbitrary unsafe HTML into emails, potentially lead to account compromise for hey .com's users who view the malicious emails
Type: XSS
Company: Basecamp
Siverity: Critical (9 ~ 10)
Bounty: $5,000
Dive into the details 🧵:📷
https://x.com/vulncure/status/1744002060016591097?s=20
🔥14👍3⚡2👏2❤1🕊1
PART - #2 🔐🛡
Understanding the Foundation: Jenkins Security Overview 🔐🛠
Before delving into exploitation, let's establish a solid understanding of key Jenkins security components:
Dive into the details 🧵:📷
https://x.com/vulncure/status/1744722597194186854?s=20
Understanding the Foundation: Jenkins Security Overview 🔐🛠
Before delving into exploitation, let's establish a solid understanding of key Jenkins security components:
Dive into the details 🧵:📷
https://x.com/vulncure/status/1744722597194186854?s=20
👍4❤2🔥2❤🔥1
PART - #3 🕵️♂️🛠
Let's Crack The Jenkins Instance 🔓
Now, let's take the plunge into Remote Code Execution (RCE) using Groovy scripts. This method is stealthier than creating a new project, so buckle up:
Dive into the details 🧵:📷
https://x.com/vulncure/status/1745514588001701991?s=20
Let's Crack The Jenkins Instance 🔓
Now, let's take the plunge into Remote Code Execution (RCE) using Groovy scripts. This method is stealthier than creating a new project, so buckle up:
Dive into the details 🧵:📷
https://x.com/vulncure/status/1745514588001701991?s=20
👍3❤1
PART - #4 ⚙️🔨
💨Mastering Jenkins RCE - Crafting and Modifying Projects 💼💻
Now, let's explore the art of Remote Code Execution (RCE) by creating and modifying projects in Jenkins.
🔑 Authority to tweak? Potent, if noisy! 🌪
Ready to amplify Jenkins skills? 🧵📷
https://x.com/vulncure/status/1746033898746736840?s=20
💨Mastering Jenkins RCE - Crafting and Modifying Projects 💼💻
Now, let's explore the art of Remote Code Execution (RCE) by creating and modifying projects in Jenkins.
🔑 Authority to tweak? Potent, if noisy! 🌪
Ready to amplify Jenkins skills? 🧵📷
https://x.com/vulncure/status/1746033898746736840?s=20
👍7❤2⚡2