Privilege escalation, website takeover, DDO attack, DNS hijacking
6.57K subscribers
70 photos
1 video
3 links
Privilege escalation, website takeover, DDO attack, DNS hijacking
@Mikelaotoo
Download Telegram
Understanding the JDK 8u20 Native Deserialization Vulnerability Through a Case Study

It can be observed that in the initial patch, the official approach used the second method discussed online, which changed the previous return statement to throwing an exception (a professional hacker service).
@SunlightAllison
The client requires no additional files; use it exactly as you would.

The image below shows login via AgScript.

As you can see, even with the correct password, login is unsuccessful. Only by entering the correct password and adding a valid 6-digit dynamic password after the nickname can you successfully log in. Professional hacking service. 24/7 top-tier service.
Financial investors are infiltrating domestic apps and overseas websites, hacking into backends, extracting databases, hijacking DNS, and gaining server access, among other things.
@SunlightAllison
"Network attack reflection technology," as a proactive defense technique, does not aim to cause substantial harm to the attacker. Instead, it aims to ensure the victim is protected from harm while preserving evidence of the attack, analyzing the attack, and obtaining firsthand intelligence. This, in turn, helps the victim improve their overall defense capabilities.
After executing the SQL statement, the record will be saved in shell.php.
Here we choose AX's Wi-Fi and begin capturing PMKID, a relatively new method from a few years ago used to crack WPA/WPA2 protocol passwords for wireless networks. Previous methods required attackers to capture the complete handshake packet when a user connects to the router. This new method, however, can obtain the PMKID by sending a request to the access point (AP) without a client, which can then be used for cracking. Furthermore, the researcher's article indicates that this attack works on all wireless networks that support and have roaming enabled, although it's unclear exactly how many routers it will be effective against.
@SunlightAllison
Checking the log status, it was found that "off" was not enabled, and the log save path was *@#*@*#@.log. It was discovered that the website is hosted using phpstudy, so the website path is under D:\phpstudy\www\.
Database backend privileges (get shell): Log in to the backend by brute-forcing weak passwords.
@SunlightAllison
This media is not supported in your browser
VIEW IN TELEGRAM
1Today, I made a profit of 50,000 yuan from the betting odds. I'm going to stop and have a drink, and then find two girls for a massage.
@SunlightAllison