If CSP policy points to a dir and you use %2f to encode "/", it is still considered to be inside the dir. All browsers seem to agree on that.
This leads to a possible bypass, by using "%2f..%2f" if server decodes it, example: https://t.co/Dl9hkKtlQc
This leads to a possible bypass, by using "%2f..%2f" if server decodes it, example: https://t.co/Dl9hkKtlQc
Jsbin
JS Bin
A live pastebin for HTML, CSS & JavaScript and a range of processors, including SCSS, CoffeeScript, Jade and more...
Taking control of VMWare through the universal host controller interface
Part 1: https://www.zerodayinitiative.com/blog/2019/5/7/taking-control-of-vmware-through-the-universal-host-controller-interface-part-1
Part 2: https://www.zerodayinitiative.com/blog/2019/8/15/taking-control-of-vmware-through-the-universal-host-control-interface-part-2
#ITSecurity #pentest #hacking #hack #it
Part 1: https://www.zerodayinitiative.com/blog/2019/5/7/taking-control-of-vmware-through-the-universal-host-controller-interface-part-1
Part 2: https://www.zerodayinitiative.com/blog/2019/8/15/taking-control-of-vmware-through-the-universal-host-control-interface-part-2
#ITSecurity #pentest #hacking #hack #it
Zero Day Initiative
Zero Day Initiative — Taking Control of VMware Through the Universal Host Controller Interface: Part 1
Pwn2Own is a heck of an amazing contest. Not only because of all the media and vibe that goes with it, but because of the caliber of skills that we see demonstrated. It’s also quite fascinating to see new people burst onto the scene with mad skills. Additionally…
gophish: Open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training.
https://t.co/socwoZRCPq
https://t.co/socwoZRCPq
GitHub
gophish/gophish
Open-Source Phishing Toolkit. Contribute to gophish/gophish development by creating an account on GitHub.
Hiding in plain sights with rogue/fake computer accounts:
1/2) https://t.co/qmoAW70RFz
2/2) https://t.co/E57cqSzKom
1/2) https://t.co/qmoAW70RFz
2/2) https://t.co/E57cqSzKom
blog.menasec.net
Threat Hunting #6 - Hiding in plain sights with real or rogue computer accounts - Part 1/2
Every Windows computer that joins a domain has a computer account. Similar to user accounts, computer accounts provide a means for authentic...
Quick Tip: While you are trying to find more subdomains and you use the Google Dork: site:*.example.com, NEVER forget to check
site:*.*.example.com and
site:*.*.*.example.com
site:*.*.example.com and
site:*.*.*.example.com