A step-by-step Linux Kernel exploitation (4 part series)
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part1.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part2.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part3.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part4.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part1.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part2.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part3.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part4.html
Hacking SQL Server Stored Procedures
1: (un)Trustworthy Databases
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-1-untrustworthy-databases/
2: User Impersonation
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-2-user-impersonation/
3: SQL Injection
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-3-sqli-and-user-impersonation/
4: Enumerating Domain Accounts
https://blog.netspi.com/hacking-sql-server-procedures-part-4-enumerating-domain-accounts/
#infosec #pentest #redteam
1: (un)Trustworthy Databases
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-1-untrustworthy-databases/
2: User Impersonation
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-2-user-impersonation/
3: SQL Injection
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-3-sqli-and-user-impersonation/
4: Enumerating Domain Accounts
https://blog.netspi.com/hacking-sql-server-procedures-part-4-enumerating-domain-accounts/
#infosec #pentest #redteam
NetSPI
Hacking SQL Server Stored Procedures – Part 1: (un)Trustworthy Databases
In this blog I’ll show how database users commonly created for web applications can be used to escalate privileges in SQL Server when database ownership is poorly configured.
CSV Injection: http://ghostlulz.com/csv-injection/
ClickJacking: http://ghostlulz.com/clickjacking/
Exposed Firebase DB: http://ghostlulz.com/google-exposed-firebase-database/
Config Files: http://ghostlulz.com/exposed-log-and-configuration-files/
Kubernetes API : http://ghostlulz.com/exposed-kubernetes-api/
#bugbounty #bugbountytips #bugbountytip #redteam #pentest #infosec #xss
ClickJacking: http://ghostlulz.com/clickjacking/
Exposed Firebase DB: http://ghostlulz.com/google-exposed-firebase-database/
Config Files: http://ghostlulz.com/exposed-log-and-configuration-files/
Kubernetes API : http://ghostlulz.com/exposed-kubernetes-api/
#bugbounty #bugbountytips #bugbountytip #redteam #pentest #infosec #xss
Ghostlulz
CSV Injection - Ghostlulz
How to use CSV injection AKA Formula injection to embed a malicous payload into to spread sheet.
#PostExploitation
Pentesting_Toolkit
https://github.com/bt3gl/Pentesting_Toolkit
pupy
https://github.com/n1nj4sec/pupy
fsociety
https://github.com/Manisso/fsociety
hacker-roadmap
https://github.com/sundowndev/hacker-roadmap
mimipenguin
https://github.com/huntergregal/mimipenguin
merlin
https://github.com/Ne0nd0g/merlin
EvilOSX
https://github.com/Marten4n6/EvilOSX
#bugbountytips
Pentesting_Toolkit
https://github.com/bt3gl/Pentesting_Toolkit
pupy
https://github.com/n1nj4sec/pupy
fsociety
https://github.com/Manisso/fsociety
hacker-roadmap
https://github.com/sundowndev/hacker-roadmap
mimipenguin
https://github.com/huntergregal/mimipenguin
merlin
https://github.com/Ne0nd0g/merlin
EvilOSX
https://github.com/Marten4n6/EvilOSX
#bugbountytips
GitHub
GitHub - bt3gl-labs/Pentesting-Toolkit: 🏴☠️ Tools for pentesting, CTFs & wargames. - 𝚋𝚢 𝚋𝚝𝟹𝚐𝚕
🏴☠️ Tools for pentesting, CTFs & wargames. - 𝚋𝚢 𝚋𝚝𝟹𝚐𝚕 - GitHub - bt3gl-labs/Pentesting-Toolkit: 🏴☠️ Tools for pentesting, CTFs & wargames. - 𝚋𝚢 𝚋𝚝𝟹𝚐𝚕
Parameter tampering
https://blog.securitybreached.org/2020/01/26/improper-input-validation-add-custom-text-and-urls-in-sms-send-by-snapchat-bug-bounty-poc
https://medium.com/bugbountywriteup/vimeo-livestream-bug-bounty-writeup-13fd208b5f4f
https://b3nac.com/posts/2019-09-02-Spear-Texting-Via-Parameter-Injection.html
https://apapedulimu.click/price-parameter-tampering-on-bukalapak
https://medium.com/bugbountywriteup/shopping-products-for-free-parameter-tampering-vulnerability-8e09e1471596
https://medium.com/@kanchansinghyadav/one-more-parameter-manipulation-bug-7fa0551a6021
https://blog.avatao.com/How-I-could-steal-your-photos-from-Google
https://medium.com/@raghav2039/bug-bounty-how-i-booked-a-rental-house-for-just-1-00-inr-price-manipulation-in-citrus-pay-318ff6e0d8a8
https://medium.com/bugbountywriteup/how-i-got-paid-0-from-the-indias-largest-online-gifting-portal-bug-bounty-program-fd9e14f9ca20
#bugbounty,#bugbountytips
https://blog.securitybreached.org/2020/01/26/improper-input-validation-add-custom-text-and-urls-in-sms-send-by-snapchat-bug-bounty-poc
https://medium.com/bugbountywriteup/vimeo-livestream-bug-bounty-writeup-13fd208b5f4f
https://b3nac.com/posts/2019-09-02-Spear-Texting-Via-Parameter-Injection.html
https://apapedulimu.click/price-parameter-tampering-on-bukalapak
https://medium.com/bugbountywriteup/shopping-products-for-free-parameter-tampering-vulnerability-8e09e1471596
https://medium.com/@kanchansinghyadav/one-more-parameter-manipulation-bug-7fa0551a6021
https://blog.avatao.com/How-I-could-steal-your-photos-from-Google
https://medium.com/@raghav2039/bug-bounty-how-i-booked-a-rental-house-for-just-1-00-inr-price-manipulation-in-citrus-pay-318ff6e0d8a8
https://medium.com/bugbountywriteup/how-i-got-paid-0-from-the-indias-largest-online-gifting-portal-bug-bounty-program-fd9e14f9ca20
#bugbounty,#bugbountytips
Security Breached Blog
Improper Input Validation | Add Custom Text and URLs In SMS send by Snapchat | Bug Bounty POC - Security Breached Blog
Hey guys so this blog post is about an Issue in Snapchat's Website, due to Improper Input Validation one can add custom text & urls in SMS send by Snapchat here's a Short POC of the issue.