hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Unauthenticated Dumping of Usernames via Cisco Unified Call Manager (CUCM)
www.n00py.io
Unauthenticated Dumping of Usernames via Cisco Unified Call Manager (CUCM)
This blog is about something I found recently regarding Cisco Unified Call Manager (CUCM). While playing around with SeeYouCM Thief, which is designed to download parse configuration files from Cisco phone systems, I noticed something interesting within…
hack and bug bounty
Adding DCSync Permissions from Linux
www.n00py.io
Adding DCSync Permissions from Linux
Recently I came upon an attack path in BloodHound that looked like this: I had control of a computer object (an Exchange server) that effectively had WriteDacl over the domain. I had a few constraints as well: All systems were configured with EDR I only had…
hack and bug bounty
從 2013 到 2023: Web Security 十年之進化與趨勢!
Orange Tsai
從 2013 到 2023: Web Security 十年之進化與趨勢!
TL;DR for Hackers & Researchers: this is a more conceptual talk for web developers. All are in Mandarin but you can check the slides here if interested. 好久沒有打部落格了,紀錄一下這次我在 WebConf 2023 上的演講,大概就是把
hack and bug bounty
A New Attack Surface on MS Exchange Part 4 - ProxyRelay!
Orange Tsai
A New Attack Surface on MS Exchange Part 4 - ProxyRelay!
This is a cross-post blog from DEVCORE. You can check the series on: A New Attack Surface on MS Exchange Part 1 - ProxyLogon! A New Attack Surface on MS Exchange Part 2 - ProxyOracle! A New Attack S
hack and bug bounty
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS!
Orange Tsai
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS!
Hi, this is my fifth time speaking at Black Hat USA and DEFCON. You can get the slide copy and video there: Let’s Dance in the Cache - Destabilizing Hash Table on Microsoft IIS (slides) Let’s Dan
hack and bug bounty
A New Attack Surface on MS Exchange Part 3 - ProxyShell!
Orange Tsai
A New Attack Surface on MS Exchange Part 3 - ProxyShell!
P.S. This is a cross-post blog from Zero Day Initiative (ZDI) This is a guest post DEVCORE collaborated with Zero Day Initiative (ZDI) and published at their blog, which describes the exploit chain w
hack and bug bounty
A New Attack Surface on MS Exchange Part 2 - ProxyOracle!
Orange Tsai
A New Attack Surface on MS Exchange Part 2 - ProxyOracle!
Hi, this is the part 2 of the New MS Exchange Attack Surface. Because this article refers to several architecture introductions and attack surface concepts in the previous article, you could find the
hack and bug bounty
A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
Orange Tsai
A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
The series of A New Attack Surface on MS Exchange: A New Attack Surface on MS Exchange Part 1 - ProxyLogon! A New Attack Surface on MS Exchange Part 2 - ProxyOracle! A New Attack Surface on MS Excha
hack and bug bounty
Red Teaming 101 — Physical Access Controls
Medium
Red Teaming 101 — Physical Access Controls
Physical access controls are designed to prevent unauthorized access to secure areas directly. Examples of physical access controls…
hack and bug bounty
Useful Offensive Snippets
Medium
Useful Offensive Snippets
I will update this post regularly, I am starting with a few of my most commonly used snippets.
hack and bug bounty
SolarWinds what probably (most-likely) happened…
Medium
SolarWinds what probably (most-likely) happened…
TL;DR
hack and bug bounty
File descriptors — pwnable.kr
Medium
File descriptors — pwnable.kr
Firstly I want to say that I highly recommend https://pwnable.kr/play.php to learn exploit development, the site is full of nice and easy…
hack and bug bounty
LEVEL 01 — IO WARGAME
Medium
LEVEL 01 — IO WARGAME
Hi everyone, it’s been some time since I last posted but I was just playing IO WARGAME and decided to write some up some solutions in the…
hack and bug bounty
Days 83, 84, 85 & 86 on https://labs.p64cyber.com
Medium
Days 83, 84, 85 & 86 on https://labs.p64cyber.com
As you should know by now, this blog has moved but incase you have missed it, check back to the site daily: https://labs.p64cyber.com
hack and bug bounty
Day 82: Hunting for Vulnerabilities in Android Apps with Burp and APK Tools
Medium
Day 82: Hunting for Vulnerabilities in Android Apps with Burp and APK Tools
https://labs.p64cyber.com/hunting-for-vulnerabilities-in-android-apps-with-burp-and-apk-tools/
hack and bug bounty
Day 80: P64 is the new Medium
Medium
Day 80: P64 is the new Medium
Today I am sharing more than one post, the new site, P64. Over time P64 will become the number one online offensive security resource, it…
hack and bug bounty
Day 80: Becoming a Version Detection Ninja with GIT
Medium
Day 80: Becoming a Version Detection Ninja with GIT
“Day 80: Becoming a Version Detection Ninja with GIT” is published by Diddy Doodat.
hack and bug bounty
Bricks Huisarts v2.3.12.94166 vulnerable to executable uploads in e-consultation send by patients
Medium
Bricks Huisarts v2.3.12.94166 vulnerable to executable uploads in e-consultation send by patients
A bug alowed executable file uploads from patients into the EHR system. A double click on the wrong file could execute malicious code.
hack and bug bounty
Misconfigured API endpoint on portal.skge.nl leaks PII data of registered healthcare providers
Medium
Misconfigured API endpoint on portal.skge.nl leaks PII data of registered healthcare providers
Two IDOR bugs leak private data on healthcare providers; their e-mail, phone and address.
hack and bug bounty
Two different IDOR bugs at mijn.VvAA.nl
Medium
Two different IDOR bugs at mijn.VvAA.nl lead to potential access to data of 130k healthcare providers; including their own cyber…
The bugs lead to potential access to data of 130k healthcare providers; including their own cyber risk insurance policy documents.
hack and bug bounty
Remote Code execution at ws1.aholdusa.com — Compromising logins of Ahold Delhaize USA employees
Medium
Remote Code execution at ws1.aholdusa.com — Compromising logins of Ahold Delhaize USA employees for >3.5 years (or even 18 years?)
Compromising logins of Ahold Delhaize USA employees for >3.5 years (or even 18 years?). Escalating a XSS bug to Perl SSTI RCE. Full…