Hacking Brasil
241 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Reprodução da CVE-2023–29357 e CVE-2023–24955 no Microsoft SharePoint.

A chain permite que usuários não autenticados executem comandos arbitrários no servidor.

Atualize seu software o mais rápido possível!
■ Historic picture. Jewish refugees sailing to Palestine.

■ The placard says: "The Germans have annihilated our families, don't annihilate our last hope"...

■ The Palestinians didn't even think about how that would end for them...

■ Follow @UkraineHumanRightsAbuses
☠️Cache poisoning in Drupal core

According to the CVE-2023-5256 disclosure, you can cache admin session cookies by causing a 4xx response when visiting a crafted URL in JSON:API.

You can lure an admin using a link, steal his session cookies and gain administrative access to the website. In this way, an attacker can completely compromise the confidentiality, integrity and availability of the website.

PoC

/jsonapi/user/user?filter[a-labex][condition][path]=cachingyourcookie

#web #cve #cache #drupal
Extreme Privacy - Mobile Devices.pdf
2.1 MB
Extreme Privacy: Mobile Devices - Digital Edition (2023)

Version : 2023.06.18

Info : https://inteltechniques.com/book7a.html

@hackingbra
🛡️ Awesome EDR Bypass Resources For Ethical Hacking ⚔️

EDR bypass technology is not just for attackers. Many malware now have EDR bypass capabilities, knowledge that pentesters and incident responders should also be aware of. This repository is not intended to be used to escalate attacks. Use it for ethical hacking.

https://github.com/tkmru/awesome-edr-bypass
CVE-2023-22515 Exploit Script🔐

This script is designed to exploit the CVE-2023-22515 vulnerability in Confluence, which allows for unauthorized access to Confluence Server and Confluence Data Center instances.

The script will provide information about the exploitation process, such as whether the vulnerability was successfully triggered, whether a new administrator was created, and whether authentication was successful.

https://github.com/Chocapikk/CVE-2023-22515
🥔 Coerced Potato

New tool for local privilege escalation on a Windows machine, from a service account to NT SYSTEM. Should work on any recent versions of Windows.

⚙️ Tool:
https://github.com/hackvens/CoercedPotato

📝 Research:
https://blog.hackvens.fr/articles/CoercedPotato.html
CVE-2023-36723 Windows Container Manager Service Elevation of Privilege Vulnerability.

An attacker can abuse this vulnerability to execute code in process that is running with SYSTEM privileges by abusing SxS assembly loading.

@hackingbra
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).

https://github.com/AleksaMCode/WiFi-password-stealer
Hacking Brasil
CVE-2023-22515 Exploit Script🔐 This script is designed to exploit the CVE-2023-22515 vulnerability in Confluence, which allows for unauthorized access to Confluence Server and Confluence Data Center instances. The script will provide information about the…
CVE-2023-22515 : Broken Access Control Vulnerability in Confluence Data Center and Server

#FOFA
Query: icon_hash="-305179312"
Query: app="ATLASSIAN-Confluence"

#SHODAN
Query: http.favicon.hash:-305179312

#HUNTER.HOW
Query: product.name="Confluence"