Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://medium.com/@freedy0/hack-the-box-legacy-writeup-fe07c63a99b1
?
Medium
Hack The Box | Legacy — Writeup
Here is my the very first hacking writeup. And the first machine is Legacy — retired, but pretty useful for novice. This machine was…
Information Security
http://mobsf.github.io/Mobile-Security-Framework-MobSF/changelog.html
Mobile Security Framework (MobSF)
v4.3.0 Changelog
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Information Security
https://3xpl01tc0d3r.blogspot.com/2019/12/process-injection-part-v.html
https://github.com/3xpl01tc0d3r/ProcessInjection
Blogspot
Process Injection - Part V
Blogs related to information security.
Information Security
https://www.cyberciti.biz/faq/linux-run-a-command-with-a-time-limit/
nixCraft
Linux run a command with a time limit (timeout)
Run a Linux/Unix command with a time limit: Learn how to run a command, and have it abort or timeout after N seconds using timeout, bash & Perl one-liner
Information Security
https://www.varonis.com/blog/pen-testing-active-directory-environments-part-introduction-crackmapexec-powerview/
Varonis
Pen Testing Active Directory Environments, Part I: Introduction to crackmapexec (and PowerView)
I was talking to a pen testing company recently at a data security conference to learn more about “day in the life” aspects of their trade. Their president told me...
Information Security
#Powershell
script to extract all users and last logon timestamp from a domain
https://gallery.technet.microsoft.com/scriptcenter/Powershell-script-to-398c5aab
Information Security
https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104
Medium
D-Link DIR-859 — RCE UnAutenticated (CVE-2019–17621) [EN]
Researchers
Information Security
https://www.n00py.io/2020/01/zero-day-exploit-in-determine-selectica-contract-lifecycle-management-sclm-v5-4/
www.n00py.io
Zero day vulnerabilities in Determine Selectica Contract Lifecycle Management (SCLM)
Recently I discovered multiple high severity vulnerabilities in Selectica Contract Lifecycle Management (SCLM) version 5.4. Cross-site Scripting (XSS) There was no shortage of XSS in this app. Here's an example from a light scan with Burp Suite: This is…
Information Security
#SSRF
Write-ups
https://t.co/B1rpUlRIhH
https://t.co/4w1lsceQKh
https://t.co/zi4NXoSVX2
https://t.co/oAIiVSjkJG
https://t.co/6OfhOqBtMH
https://t.co/6OfhOqBtMH
https://t.co/pEZZv9qlKh
#bugbounty
#bugbountytips
Information Security
https://blog.ripstech.com/2018/cubecart-admin-authentication-bypass/
Sonarsource
Sonar Blog for Clean Code
Sonar is the home of Clean Code. Our blog showcases our products: SonarLint, SonarQube, and SonarCloud - trusted by 400k+ organizations globally.
Information Security
https://github.com/cujanovic/SSRF-Testing
GitHub
GitHub - cujanovic/SSRF-Testing: SSRF (Server Side Request Forgery) testing resources
SSRF (Server Side Request Forgery) testing resources - cujanovic/SSRF-Testing
Information Security
http://webcache.googleusercontent.com/search?q=cache:http://blog.safebuff.com/2016/07/03/SSRF-Tips/
Information Security
https://medium.com/secjuice/php-ssrf-techniques-9d422cb28d51
Medium
PHP SSRF Techniques
How to bypass filter_var(), preg_match() and parse_url()
Information Security
https://hydrasky.com/network-security/exploiting-ssrf-in-video-converters/
Information Security
https://blog.detectify.com/2019/01/10/what-is-server-side-request-forgery-ssrf/
Detectify Blog
What is server side request forgery (SSRF)? - Detectify Blog
What is Server Side Request Forgery? This vulnerability can be exploited by a hacker to send requests to internal systems behind a firewall. Learn more.
Information Security
Bug Bounty POC
https://drive.google.com/drive/folders/14zlqgin6rUfr6jQRBCLbbP8P8Vdypz7x
Information Security
https://medium.com/@arbazhussain/race-condition-bypassing-team-limit-b162e777ca3b
Medium
Race Condition bypassing team limit
Severity: Medium
Information Security
https://medium.com/@kapilvermarbl/ssrf-server-side-request-forgery-5131ffd61c3c
Medium
SSRF(Server Side Request Forgery)
Server Side Request Forgery (SSRF) is a type of attack that can be carried out to compromise a server. The exploitation of an SSRF…
Information Security
https://medium.com/cyberverse/bug-bounty-with-bash-438596ff72f5?_branch_match_id=679786477478033392
Medium
Bug Bounty with Bash
Hello guys,
Information Security
SQL injection Write-ups
https://t.co/VJrQviV41u
https://t.co/pMUkXmlooo
https://t.co/lCzAMhsIe6
https://t.co/Y22WjKRaF7
https://t.co/RmU5J31Fwa
https://t.co/W3zz8mdhg0
https://t.co/bT4WwT2YgH
https://t.co/S9NMY7QADm
https://t.co/QA8Sd4knqV
#bugbounty
#bugbountytips