unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
This does impact “Confidentiality” of the system running the vulnerable software.
Harsh BothraJun 18 · 1 min readThis does impact the “Confidentiality” of the system running the vuln...
2020-06-18 19:43:01 | 阅读: 135 |
收藏
|
medium.com
readthis
harvested
utilized
harsh
Yes. There was no Server Side Validation. All you require is:
Yes. There was no Server Side Validation. All you require is:Provide an email :
[email protected]
...
2020-06-17 11:48:26 | 阅读: 153 |
收藏
|
medium.com
occasional
teamer
synack
bugcrowd
stories
The application misses server-side checks allowing me to bypass the requirement of providing…
Harsh BothraJun 16 · 1 min readThe application misses server-side checks allowing me to bypass the r...
2020-06-16 11:16:52 | 阅读: 147 |
收藏
|
medium.com
mistakes
restriction
bypass
bothrajun
Red Team: How to embed Golang tools in C# - Shantanu Khandelwal - Medium
Last night I was working on some private tools. The story began when I presented a tool to my mentor...
2020-06-13 16:48:22 | 阅读: 510 |
收藏
|
medium.com
stringtest
printhello
nugets
dllimport
entrypoint
How to run Mimikatz on SharpHellsGate - Mark Mo - Medium
I learned a few things and had to trouble shoot a few things so I thought this might be helpful to s...
2020-06-13 16:46:28 | 阅读: 622 |
收藏
|
medium.com
mimikatz
shellcode
payload
am0nsec
hellsgate
Let’s Bypass CSRF Protection & Password Confirmation to Takeover Victim Accounts :D
Anti-CSRF Tokens are a way that allows the server to uniquely distinguish who actually requests the...
2020-06-13 01:43:20 | 阅读: 149 |
收藏
|
medium.com
bypass
1host
forged
victim
editprofile
XSS to Database Credential Leakage & Database Access — Story of total luck!
Reflected Cross-Site Scripting happens when you provide a malicious javascript code to some input pa...
2020-06-06 21:47:06 | 阅读: 131 |
收藏
|
medium.com
database
lucky
luck
malicious
wordpress
Found Stored Cross-Site Scripting — What’s Next? — Privilege Escalation like a Boss :D
Cross-site scripting is one of the prominent attacks of all time. It is still being exploited in the...
2020-05-20 01:17:37 | 阅读: 128 |
收藏
|
medium.com
attacker
hanging
exploited
remote
hijacking
The “+” here is used to create an alias.
The “+” here is used to create an alias. For example, If your email id is
[email protected]
— ex...
2020-05-19 14:50:17 | 阅读: 146 |
收藏
|
medium.com
example0516
synack
harshbothra
poet
bugcrowd
XXE on Windows system …then what ?? - Hamada - Medium
Assignment :During a pentest, i was auditing a web application which hosting documents and files in...
2020-02-17 17:47:15 | 阅读: 632 |
收藏
|
medium.com
payload
windows
friend
microsoft
b00m
Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)
CVE-2018–7445 is a stack buffer overflow in the SMB service binary present in all RouterOS versions...
2020-02-01 00:46:18 | 阅读: 518 |
收藏
|
medium.com
routeros
payload
mutiny
crash
fuzzer
picoCTF 2019 — JS Kiddie writeup (850 points)
The writeup for Script Kiddie 1 and the Script Kiddie 2 challengesPhoto by Kevin Horvat on UnsplashT...
2019-10-24 18:31:26 | 阅读: 9 |
收藏
|
Stories by @radekk on Medium - medium.com
kiddie
shifter
solved
qr
HITCON CTF 2019 Quals — One Punch Man [PWN 292pts]
題目是經典類選單題型,可以new/modify/show/delete:debut(new) — 可以分配0x80–0x400(small range),然後是用calloc給的modiry(rena...
2019-10-16 19:08:37 | 阅读: 20 |
收藏
|
medium.com
一塊
calloc
0x400
一個
unsorted
Red Teamer’s Guide to Pulse Secure SSL VPN - InfoSec Write-ups - Medium
This write-up is the collective efforts of collaborating with various hackers on exploring and furth...
2019-10-07 12:24:02 | 阅读: 476 |
收藏
|
medium.com
ssh
sshd
pulse
orange
injection
URL Bar Spoofing Flaw in Safari for iOS 12.3 and iOS 13 Beta | CVE-2019-8727
While working for browser-based attacks on the URL bar, I learned a way where it was still possible...
2019-10-04 17:36:51 | 阅读: 467 |
收藏
|
medium.com
spoofing
spoof
autofocus
security
setinterval
How to find vulnerabilities on OS X?
Photo by Benjamin Voros on UnsplashA while ago I did find a security vulnerability in hundreds of Ma...
2019-9-15 20:55:58 | 阅读: 6 |
收藏
|
Stories by @radekk on Medium - medium.com
sparkle
appcast
updater
sequelpro
dsa
5min Bash — sed
When you should use “sed” command?Replacing text in files and stdin, i.e. “cat”, “echo” commandsRemo...
2019-9-14 22:13:11 | 阅读: 5 |
收藏
|
Stories by @radekk on Medium - medium.com
replacing
bak
backup
5min Bash — grep
When you should use “grep” command?Searching for files with a specific text or regular expression pa...
2019-9-14 21:59:45 | 阅读: 5 |
收藏
|
Stories by @radekk on Medium - medium.com
zgrep
inverse
occurrences
recursively
Hacking home routers from the Internet
If an attacker is able to execute commands directly on your router he can:Attack your internal netwo...
2019-9-12 15:1:1 | 阅读: 6 |
收藏
|
Stories by @radekk on Medium - medium.com
attacker
rebinding
remote
nvram
sop
Puzzle hidden in the book
The full title of this polish book is “Praktyczna inżynieria wsteczna” which we can translate to “Ap...
2019-9-10 15:1:1 | 阅读: 7 |
收藏
|
Stories by @radekk on Medium - medium.com
crc32c
checksums
memory
rwx
Previous
9
10
11
12
13
14
15
16
Next