Amass: New Config File Update
https://medium.com/@hackerassociate/amass-new-config-file-update-e95d09b6eb70
https://medium.com/@hackerassociate/amass-new-config-file-update-e95d09b6eb70
Medium
Amass: New Config File Update
Bug Bounty Tutorial
🔥4👏1
Breaking Fortinet Firmware Encryption
https://bishopfox.com/blog/breaking-fortinet-firmware-encryption
https://bishopfox.com/blog/breaking-fortinet-firmware-encryption
Bishop Fox
Breaking Fortinet Firmware Encryption
Review our latest Fortinet analysis that breaks encryption on firmware images, leading to improved detection, fingerprinting, and exploit development.
🔥2
Path traversal to RCE in Android — Mobile Hacking Lab ‘Document Viewer’ write-up
https://ajmal-moochingal.medium.com/path-traversal-to-rce-in-android-mobile-hacking-lab-document-viewer-write-up-ef9226aea1ac
https://ajmal-moochingal.medium.com/path-traversal-to-rce-in-android-mobile-hacking-lab-document-viewer-write-up-ef9226aea1ac
Medium
Path traversal to RCE in Android — Mobile Hacking Lab ‘Document Viewer’ write-up
During my preparation for eMAPT, I came across Mobile Hacking Lab — and their free hacking labs which I felt would help me for practice…
Fuzz Everything, Everywhere, All at Once - Advanced QEMU-based fuzzing
https://media.ccc.de/v/37c3-12102-fuzz_everything_everywhere_all_at_once
https://media.ccc.de/v/37c3-12102-fuzz_everything_everywhere_all_at_once
media.ccc.de
Fuzz Everything, Everywhere, All at Once
The maintainers of the AFLplusplus open-source project show crazy new ways to (ab)use QEMU to explore difficult, binary-only targets thro...
👍1
Scheduled Task Tampering
https://ipurple.team/2024/01/03/scheduled-task-tampering/
https://github.com/netero1010/GhostTask
https://ipurple.team/2024/01/03/scheduled-task-tampering/
https://github.com/netero1010/GhostTask
Purple Team
Scheduled Task Tampering
The HAFNIUM threat actor is using an unconventional method to tamper scheduled tasks in order to establish persistence via modification of registry keys in their malware called Tarrask. The benefit…
From Google Dorking to Unauthorized AWS Account Access and Account Takeover
https://medium.com/@ar_hawk/from-google-dorking-to-unauthorized-aws-account-access-and-account-takeover-89eb2b9d284f
https://medium.com/@ar_hawk/from-google-dorking-to-unauthorized-aws-account-access-and-account-takeover-89eb2b9d284f
Medium
From Google Dorking to Unauthorized AWS Account Access and Account Takeover
Ending 2023 with good note, I came up with another misconfiguration due to a parameter that leads to exposure of AWS credentials and access…
Bot helps to keep up to date with new CVEs and search new POC's
@pocfather_bot
@pocfather_bot
🔥3
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
https://github.com/MegaManSec/SSH-Snake
https://github.com/MegaManSec/SSH-Snake
GitHub
GitHub - MegaManSec/SSH-Snake: SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation…
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery. - MegaManSec/SSH-Snake
CVE-2023-49070/51467 - Attacking & Defending Apache OFBiz
https://www.prio-n.com/blog/cve-2023-49070-51467-attacking-defending-Apache-OFBiz
https://www.prio-n.com/blog/cve-2023-49070-51467-attacking-defending-Apache-OFBiz
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2023-36003 (Windows LPE XAML diagnostics API)
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
🔥4
Writeup for CVE-2023-39143: PaperCut WebDAV Vulnerability
https://www.horizon3.ai/writeup-for-cve-2023-39143-papercut-webdav-vulnerability/
https://www.horizon3.ai/writeup-for-cve-2023-39143-papercut-webdav-vulnerability/
Horizon3.ai
Writeup for CVE-2023-39143: PaperCut WebDAV Vulnerability
Back in Aug. 2023 we released an advisory for CVE-2023-39143, a critical vulnerability that affects Windows installs of the PaperCut NG/MF print management software. Attackers can exploit this…
🔥2
CVE-2023-7028: Gitlab Account Takeover via Password Reset
PoC 1: https://github.com/RandomRobbieBF/CVE-2023-7028
PoC 2: https://github.com/Vozec/CVE-2023-7028
* 16.1 prior to 16.1.5
* 16.2 prior to 16.2.8
* 16.3 prior to 16.3.6
* 16.4 prior to 16.4.4
* 16.5 prior to 16.5.6
* 16.6 prior to 16.6.4
* 16.7 prior to 16.7.2
PoC 1: https://github.com/RandomRobbieBF/CVE-2023-7028
PoC 2: https://github.com/Vozec/CVE-2023-7028
* 16.1 prior to 16.1.5
* 16.2 prior to 16.2.8
* 16.3 prior to 16.3.6
* 16.4 prior to 16.4.4
* 16.5 prior to 16.5.6
* 16.6 prior to 16.6.4
* 16.7 prior to 16.7.2
GitHub
GitHub - RandomRobbieBF/CVE-2023-7028: CVE-2023-7028
CVE-2023-7028. Contribute to RandomRobbieBF/CVE-2023-7028 development by creating an account on GitHub.
👍3🔥1
tRPC Security Research: Hunting for Vulnerabilities in Modern APIs
https://medium.com/@LogicalHunter/trpc-security-research-hunting-for-vulnerabilities-in-modern-apis-b0d38e06fa71
https://medium.com/@LogicalHunter/trpc-security-research-hunting-for-vulnerabilities-in-modern-apis-b0d38e06fa71
Medium
tRPC Security Research: Hunting for Vulnerabilities in Modern APIs
In this write-up, I want to discuss my research on tRPC. Initially, we will review the concepts of tRPC before proceeding to analyse the…
🔥1
How to retrive all information about Windows Extended Rights via LDAP
https://github.com/YuryStrozhevsky/extendedRights
https://github.com/YuryStrozhevsky/extendedRights
GitHub
GitHub - YuryStrozhevsky/extendedRights: How to retrive all information about Windows Extended Rights via LDAP
How to retrive all information about Windows Extended Rights via LDAP - YuryStrozhevsky/extendedRights
🔥2