DDoS attacks, gambling hacking, telemarketing data, real-time data*, mothers' data, car owner data, financial data, website intrusion, plug-in development, mobile platform intrusion and theft, gambling order modification and other related services*, Yabo data, card game data, Ouyi data*, trust data, medical data, fishing data*, hacking grades_hackers modifying grades_hackers modifying university grades, lottery data, shopping data*.
@SunlightAllison
@SunlightAllison
Port checks on the second host on the local network, 192.168.43.59, revealed that port 3306 was open, suggesting a potential MySQL service vulnerability. Further investigation was then conducted.
After verifying the direct path from the UploadHttpModule handling the request to the FileStream constructor, we must check if the file path and content are controllable. Returning to UploadContext.WritePersistFile(), both the file path and content contain a PostBackID property value. There is also a path originating from UploadHttpModule, following the call hierarchy that assigns the UploadContext.postBackID field that supports this property. The return value of the FieldNameTranslator.FileFieldNameToPostBackID(string) call in FilteringWorkerRequest.ParseOrThrow() concludes the assignment of this field.
@SunlightAllison
@SunlightAllison
• alert: This file contains all warning messages.
• gpsxml: If a GPS source was used, the relevant GPS data is stored in this file.
• nettxt: Includes all collected text output information.
• netxml: Includes all XML formatted data.
• pcapdump: Includes the packets captured throughout the entire session.
• gpsxml: If a GPS source was used, the relevant GPS data is stored in this file.
• nettxt: Includes all collected text output information.
• netxml: Includes all XML formatted data.
• pcapdump: Includes the packets captured throughout the entire session.
Essential Tools for Cybercriminals: The use of proxy IPs and SMS blocking cards in cybercriminal tools goes beyond blind indiscriminate use. For platforms with relatively strict risk controls, cybercriminals also employ methods to match the location of phone numbers with the location of IP addresses. This further conceals their malicious activities, enabling them to profit from their illegal activities.
Security Deployment The network interface card (NIC) name is the one selected in section 1.1.3, under Network Configuration, as shown in the image below. If the selected network configuration file is ifcfg-enp61s0f0, the NIC name will be enp61s0f0.
@SunlightAllison
@SunlightAllison
IIS7 website monitoring can promptly prevent and control website risks, quickly and accurately monitor whether a website is under various hijacking attacks, whether the website can be accessed normally nationwide (checking if the domain name is blocked), accurately detect DNS poisoning, and has a website loading speed test function. It can immediately identify whether a website has been hacked, compromised, had its title changed, or had malicious links added. A product striving for excellence, with zero defects provided!
Penetration testing (time-consuming, precise): Insufficient input/output validation, design flaws, environmental vulnerabilities, SQL injection, XSS, CSRF, directory traversal, file upload, code injection, command injection, information leakage, brute force attacks, privilege escalation vulnerabilities, unauthorized object references, business logic flaws, framework vulnerabilities, basic environment vulnerabilities. Information gathering --> Attack testing --> Privilege escalation --> Expansion.
Selection order (personal suggestion): Penetration DPI SDK SMS.
Penetration testing team, capable of penetration, backend access, server modification, intrusion, etc.
Selection order (personal suggestion): Penetration DPI SDK SMS.
Penetration testing team, capable of penetration, backend access, server modification, intrusion, etc.
In CVE-2020-11651, an authentication bypass vulnerability allows attackers to bypass Salt Master's authentication logic by constructing malicious requests, thereby invoking unauthorized functions and enabling remote command execution.
@SunlightAllison
@SunlightAllison
Due to recent work requirements, I needed to monitor some registered websites to find vulnerabilities, such as homepage hijacking, hidden links, and weak passwords. During this process, I discovered an interesting case that I'd like to share.
Upon opening the website, it displayed a 404 Not Found error, but the title indicated "Official Website." Examining the source code revealed malicious JavaScript.
It's clear that it checks the User Agent (UA) header. If the user accesses the website from a PC, it displays a 404 error; if they access it from a mobile phone, it redirects them to a legitimate gambling website, facilitating app downloads. The code primarily modifies webpage tags, which, in terms of XSS injection detection, resembles DOM-based injection (primarily examining the innerHTML).
Upon opening the website, it displayed a 404 Not Found error, but the title indicated "Official Website." Examining the source code revealed malicious JavaScript.
It's clear that it checks the User Agent (UA) header. If the user accesses the website from a PC, it displays a 404 error; if they access it from a mobile phone, it redirects them to a legitimate gambling website, facilitating app downloads. The code primarily modifies webpage tags, which, in terms of XSS injection detection, resembles DOM-based injection (primarily examining the innerHTML).
👑Penetration of Designated Sites
1. Clients provide their website platform. Business personnel submit the site to our technical staff for scanning and evaluation. Our technical staff analyzes the site to determine its suitability and will inform you of the timeline and cost.
👑Research and Innovation
We provide platform development services for all gray-market industries and app development for legitimate industries.
We have a technical team and both black-hat and white-hat hackers. We are available throughout Southeast Asia for in-person and offline discussions.
1. Clients provide their website platform. Business personnel submit the site to our technical staff for scanning and evaluation. Our technical staff analyzes the site to determine its suitability and will inform you of the timeline and cost.
👑Research and Innovation
We provide platform development services for all gray-market industries and app development for legitimate industries.
We have a technical team and both black-hat and white-hat hackers. We are available throughout Southeast Asia for in-person and offline discussions.
3The system design interview is considered to be the most complex and most difficult technical job interview by many.
This book provides a step-by-step framework on how to tackle a system design question.
It includes many real-world examples to illustrate the systematic approach with detailed steps that you can follow.
@SunlightAllison
This book provides a step-by-step framework on how to tackle a system design question.
It includes many real-world examples to illustrate the systematic approach with detailed steps that you can follow.
@SunlightAllison
Many people may not understand what remote code control can do. Look at the picture above; this is one of our compromised computers, belonging to a group leader in a Philippine-based overseas cryptocurrency scam. If you happen to be in the same industry, you can steal any data or scripts from their computer. You can monitor their Telegram work group and gradually obtain their customers, purchased followers, and backend account passwords. The most amazing step is that you can directly use this Telegram account to steal funds and USDT from people around them.
To make this attack more effective, the requested resource should be as large as possible; for example, the test image "test.png" in my example is over 4MB in size. If the target website doesn't have such a large resource, but supports HTTP pipelining, you can increase the returned content by requesting the same resource multiple times within the same connection. The captured data packets show that when requesting the "test.png" resource, the client's window size was intentionally set to 1120 bytes. After the client buffer was filled with data from the server, it issued a [TCP ZeroWindow] warning, forcing the server to wait. From the start of the interaction to its termination, the single connection took 14 seconds. (Captured data)
Understanding the JDK 8u20 Native Deserialization Vulnerability Through a Case Study
It can be observed that in the initial patch, the official approach used the second method discussed online, which changed the previous
@SunlightAllison
It can be observed that in the initial patch, the official approach used the second method discussed online, which changed the previous
return statement to throwing an exception (a professional hacker service).@SunlightAllison
The client requires no additional files; use it exactly as you would.
The image below shows login via AgScript.
As you can see, even with the correct password, login is unsuccessful. Only by entering the correct password and adding a valid 6-digit dynamic password after the nickname can you successfully log in. Professional hacking service. 24/7 top-tier service.
The image below shows login via AgScript.
As you can see, even with the correct password, login is unsuccessful. Only by entering the correct password and adding a valid 6-digit dynamic password after the nickname can you successfully log in. Professional hacking service. 24/7 top-tier service.
Financial investors are infiltrating domestic apps and overseas websites, hacking into backends, extracting databases, hijacking DNS, and gaining server access, among other things.
@SunlightAllison
@SunlightAllison