■■□□□ #GoodReport #XXE via File upload (#SVG)
https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/
https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/
■■■■□ #Iran|ian #BlackHat hacker group @Cra3ked [telegram] released an efficient #BruteForce utility to hack web logins with #PoC
https://github.com/Fr13ND3/1tinymvz.net/
https://github.com/Fr13ND3/1tinymvz.net/
■■■□□ #GoodReport: LFI + file upload = #RCE (#CodeExecution)
https://medium.com/@armaanpathan/chain-the-bugs-to-pwn-an-organisation-lfi-unrestricted-file-upload-remote-code-execution-93dfa78ecce
https://medium.com/@armaanpathan/chain-the-bugs-to-pwn-an-organisation-lfi-unrestricted-file-upload-remote-code-execution-93dfa78ecce
Medium
Chain The Bugs to Pwn an Organisation ( LFI + Unrestricted File Upload = Remote Code Execution )
Hi everyone, After completing my OSCP certification I thought to give a try to bug bounty, as OSCP has sharpened my exploitationSkills.
Source
Title: BugBounty types — HTML injection via email
Description: HTML injection é um ataque muito parecido com o Cross-site Scripting (XSS), enquanto no XSS o invasor pode injetar e executar códigos em…
Continue reading on Medium »
Title: BugBounty types — HTML injection via email
Description: HTML injection é um ataque muito parecido com o Cross-site Scripting (XSS), enquanto no XSS o invasor pode injetar e executar códigos em…
Continue reading on Medium »
Medium
BugBounty types — HTML injection via email
HTML injection é um ataque muito parecido com o Cross-site Scripting (XSS), enquanto no XSS o invasor pode injetar e executar códigos em…
XSS To Good XSS With ClickJacking on Subdomain Microsoft
https://link.medium.com/4EXo7G8Sk1
#XSS
#ClickJacking
#BugBounty
https://link.medium.com/4EXo7G8Sk1
#XSS
#ClickJacking
#BugBounty
Medium
XSS To Good XSS With ClickJacking on Subdomain Microsoft
Bismillah hirrahman nirrahim.
Open-redirect on Facebook (Bypass Linkshim)
https://noobsec.org/project/2020-02-16-open-redirect-on-facebook/
https://noobsec.org/project/2020-02-16-open-redirect-on-facebook/
Bypassing WAFs and cracking XOR with Hackvertor
https://portswigger.net/research/bypassing-wafs-and-cracking-xor-with-hackvertor
https://portswigger.net/research/bypassing-wafs-and-cracking-xor-with-hackvertor
Multiple sites for Obfuscation or JavaScript code obscurity.
http://utf-8.jp/public/aaencode.html
http://utf-8.jp/public/jjencode.html
http://www.jsfuck.com
#JS
#OBF
http://utf-8.jp/public/aaencode.html
http://utf-8.jp/public/jjencode.html
http://www.jsfuck.com
#JS
#OBF
“Undetectable C# & C++ Reverse Shells” by Bank Security https://link.medium.com/kIIc9Ch5b4
Medium
Undetectable C# & C++ Reverse Shells
Technical overview of different way to spawn a reverse shell on a victim machine
■■■□□ From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Medium
From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
How I Finally could Got into an Internal Network (and could accessing all of their internal assets) by Using Various Vulnerabilities.
Source Code + Sensitive Information Disclosure lead to InstaMoney and SendGrind Account Takeover
https://medium.com/@denypradana/source-code-sensitive-information-disclosure-lead-to-instamoney-and-sendgrind-account-takeover-fc9adf7d8501
https://medium.com/@denypradana/source-code-sensitive-information-disclosure-lead-to-instamoney-and-sendgrind-account-takeover-fc9adf7d8501
Fun with Amazon S3— Leaks and bucket takeover attack
https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431
https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431
Medium
Fun with Amazon S3— Leaks and bucket takeover attack
Amazon S3 joins to the LeakLooker family, now tool looks for exposed buckets and potential takeovers.
[ Writeup — Bugbounty Facebook ] Disclosure the verified phone number in Checkpoint.
https://medium.com/@tiendat253/writeup-bugbounty-facebook-disclosure-the-verified-phone-number-in-checkpoint-aa652faeaf21
https://medium.com/@tiendat253/writeup-bugbounty-facebook-disclosure-the-verified-phone-number-in-checkpoint-aa652faeaf21
HOW I BYPASSED 2 FACTOR AUTHENTICATION
https://medium.com/@manralhemant10/how-i-bypassed-2-factor-authentication-899750421331
https://medium.com/@manralhemant10/how-i-bypassed-2-factor-authentication-899750421331
Medium
HOW I BYPASSED 2 FACTOR AUTHENTICATION
INTRODUCTION: