This media is not supported in your browser
VIEW IN TELEGRAM
Apereo Cas 4.2.X Remote Code Execution.(execution =xxx_ZXlKaGJH...):GIF
👇
and about the Apereo Cas 4.1.X Remote Code Execution.(execution =xxx_AAAAIg...):
https://twitter.com/pyn3rd/status/1001758511624212480
👇
and about the Apereo Cas 4.1.X Remote Code Execution.(execution =xxx_AAAAIg...):
https://twitter.com/pyn3rd/status/1001758511624212480
https://media.ccc.de/v/36c3-10801-sigover_alpha
SigOver + alpha. Signal overshadowing attack on LTE and its applications
SigOver + alpha. Signal overshadowing attack on LTE and its applications
media.ccc.de
SigOver + alpha
As Long-Term Evolution (LTE) communication is based on over-the-air signaling, a legitimate signal can potentially be counterfeited by a ...
Our 36c3 presentation video :
https://media.ccc.de/v/36c3-10505-the_great_escape_of_esxi#t=708
and slides:
https://url.cn/51kIMxY
😃
It's really a nice party. Hope to see you next year.
#36c3
https://media.ccc.de/v/36c3-10505-the_great_escape_of_esxi#t=708
and slides:
https://url.cn/51kIMxY
😃
It's really a nice party. Hope to see you next year.
#36c3
media.ccc.de
The Great Escape of ESXi
VMware ESXi is an enterprise-class, bare-metal hypervisor developed by VMware for deploying and serving virtual computers. As the hypervi...
“Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty” by Omkar Bhagwat (th3_hidd3n_mist) https://link.medium.com/KABwitzpQ2
Medium
Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty
Hey everyone, I recently reported a dupe for a XSSI bug on a private program which paid out $300, to the original reporter. I believe the…
https://wildfire.blazeinfosec.com/leveraging-web-application-vulnerabilities-to-steal-ntlm-hashes-2/
Blaze Information Security - Wildfire Labs
Leveraging web application vulnerabilities to steal NTLM hashes
Introduction NTLM authentication is the de-facto standard in corporate networks running Windows. There are a plethora of well-understood local attacks that take advantage of the way Windows perform automatic NTLM authentication, and abusing this feature is…
How to Takover a ldap server.
https://medium.com/@D0rkerDevil/how-i-tookover-a-ldap-server-703209161001
How PayPal helped me to generate XSS
https://medium.com/@pflash0x0punk/how-paypal-helped-me-to-generate-xss-9408c0931add
How I earned $$$$ by finding confidential customer data including plain-text passwords
https://medium.com/@saurabh5392/how-i-earned-by-finding-confidential-customer-data-including-plain-text-passwords-f93c4ce2631
#bugbounty,#bugbountytips
https://medium.com/@D0rkerDevil/how-i-tookover-a-ldap-server-703209161001
How PayPal helped me to generate XSS
https://medium.com/@pflash0x0punk/how-paypal-helped-me-to-generate-xss-9408c0931add
How I earned $$$$ by finding confidential customer data including plain-text passwords
https://medium.com/@saurabh5392/how-i-earned-by-finding-confidential-customer-data-including-plain-text-passwords-f93c4ce2631
#bugbounty,#bugbountytips
Medium
How I Tookover a ldap server.
Intro
https://github.com/s1kr10s/D-Link-DIR-859-RCE/
https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104
https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104
GitHub
GitHub - s1kr10s/D-Link-DIR-859-RCE: D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)
D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621) - s1kr10s/D-Link-DIR-859-RCE