Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://medium.com/@ss23/php-autloading-local-file-inclusion-by-design-71aafe627877
Medium
PHP Autloading: Local File Inclusion by Design
In the year 2009, PHP 5.3 was released, bringing with it major new features like namespaces and lambda functions. At the time, there was…
Information Security
https://hackerone.com/reports/713
HackerOne
HackerOne disclosed on HackerOne: Upload profile photo from URL
Using this vulnerability users can upload images from any image URL.
Just change upload type using inspect element (from "type=file" to "type=url") , paste URL in text field and hit enter or...
Information Security
https://medium.com/@neerajedwards/reading-internal-files-using-ssrf-vulnerability-703c5706eefb
Medium
Reading Internal Files using SSRF vulnerability
I am hunting on one private program since last 8 months, since it doesn’t allow disclosure i will keep organization REDACT, in requests i…
Information Security
https://medium.com/bugbountywriteup/how-i-was-able-to-remove-your-instagram-phone-number-d346515e79c3
Medium
How I was able to remove your Instagram Phone number
Phone numbers are the most important Out-of-band features in network and security, now a days from phone number we register, login for an…
Information Security
https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572
Medium
How I was able to bypass OTP code requirement in Razer [The story of a critical bug]
A story of turning an Informative bug to critical bug
Information Security
https://www.perched.io/blog/2019/1/3/dns-tunneling-amp-other-hunts-w-rocknsm-bro-amp-elk
Information Security
https://www.slideshare.net/mobile/Insovince/external-service-interaction
www.slideshare.net
External service interaction
External Service Interaction arises when it is possible to induce an application to interact with an arbitrary external service, such as a web or mail server e…
Information Security
https://portswigger.net/kb/issues/00300200_external-service-interaction-dns
portswigger.net
External service interaction (DNS)
The ability to induce an application to interact with an arbitrary external service, such as a web or mail server, does not constitute a vulnerability in its own right. This might even be the intended behavior of the application. However, in some cases, it…
Information Security
https://medium.com/@chawdamrunal/how-i-exploit-out-of-band-resource-load-http-using-burp-suite-extension-plugin-taborator-2c5065d6a50b
Medium
How i exploit out-of-band resource load (HTTP) using burp suite extension plugin (taborator)
Issue background
Information Security
Jailbreak2019.WhatsUpWithWhatsApp.pdf
2.9 MB
https://vimeo.com/377181218
Information Security
https://pentestmag.com/exploiting-the-entity-xme-xml-external-entity-injection/
Pentestmag
Exploiting The Entity: XXE (XML External Entity Injection) - Pentestmag
History In the recent year, major tech giants, like Google, Facebook, Magento, Shopify, Uber, Twitter, and Microsoft, have undergone XML …
Information Security
https://hackerone.com/reports/506646
HackerOne
Starbucks disclosed on HackerOne: Webshell via File Upload on...
johnstone discovered An arbitrary file upload via the resume functionality at https://ecjobs.starbucks.com.cn which led to arbitrary code execution by uploading a webshell.
@johnstone — thank for...
Information Security
https://medium.com/@johnssimon_6607/getting-access-to-disabled-hidden-features-with-the-help-of-burp-match-and-replace-e1d7b70d131e
Medium
Getting access to disabled/hidden features with the help of Burpsuite Match and Replace settings
A few months ago, During my bug bounty hunting, I came across a Company that lets other developers create API documentation similar to…
Information Security
https://github.com/jreppiks/CVE-2017-12149
GitHub
GitHub - jreppiks/CVE-2017-12149: Jboss Java Deserialization RCE (CVE-2017-12149)
Jboss Java Deserialization RCE (CVE-2017-12149). Contribute to jreppiks/CVE-2017-12149 development by creating an account on GitHub.
Information Security
https://www.a12d404.net/windows/2019/01/13/persistance-via-path-directories.html
www.a12d404.net
Windows 10 Persistence via PATH directories - CDPSvc
CDPSvc allows DLL Loading via writable PATH directories
Information Security
https://www.apriorit.com/dev-blog/640-qa-fuzzing-for-closed-source-windows-software
Apriorit
Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing | Apriorit
This article is about discovering vulnerabilities even in closed source software by applying fuzzing testing.
Information Security
https://decoder.cloud/2019/12/12/from-iphone-to-nt-authoritysystem/
Decoder's Blog
From iPhone to NT AUTHORITY\SYSTEM
As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. But what does Apple’s iPhone have to do with it?? Well, keep on r…
Information Security
https://microsoft.github.io/CCF/
https://github.com/microsoft/CCF
GitHub
GitHub - microsoft/CCF: Confidential Consortium Framework
Confidential Consortium Framework. Contribute to microsoft/CCF development by creating an account on GitHub.
Information Security
https://github.com/hubert3/isniff-gps
GitHub
hubert3/iSniff-GPS
Passive sniffing tool for capturing and visualising WiFi location data disclosed by iOS devices - hubert3/iSniff-GPS
Information Security
https://medium.com/tenable-techblog/winbox-in-the-wild-9a2ee4946add
Medium
Winbox in the Wild
Port 8291 Scan Results