“Recon Everything” by SACHIN GROVER https://link.medium.com/ReykAnzk23
Medium
Recon Everything
Bug Bounty Hunting Tip #1- Always read the Source Code
different 2FA bypasses:
evilginx:https://github.com/kgretzky/evilginx2
CredSniper:https://github.com/ustayready/CredSniper
ReelPhish:https://github.com/fireeye/ReelPhish
Modlishka:https://github.com/drk1wi/Modlishka
#pentest #hacking #phishing #redteam #bugbountytip
evilginx:https://github.com/kgretzky/evilginx2
CredSniper:https://github.com/ustayready/CredSniper
ReelPhish:https://github.com/fireeye/ReelPhish
Modlishka:https://github.com/drk1wi/Modlishka
#pentest #hacking #phishing #redteam #bugbountytip
GitHub
GitHub - kgretzky/evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session…
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication - kgretzky/evilginx2
CVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem
https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
slides: https://a13xp0p0v.github.io/img/CVE-2019-18683.pdf
PoC exploit demo video: https://youtube.com/watch?v=mb4YHyLy0Zc
Enjoy!
https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
slides: https://a13xp0p0v.github.io/img/CVE-2019-18683.pdf
PoC exploit demo video: https://youtube.com/watch?v=mb4YHyLy0Zc
Enjoy!
Alexander Popov
CVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem
This article discloses exploitation of CVE-2019-18683, which refers to multiple five-year-old race conditions in the V4L2 subsystem of the Linux kernel. I found and fixed them at the end of 2019. Here I'm going to describe a PoC exploit for x86_64 that gains…