SecList for CyberStudents
240 subscribers
598 photos
24 videos
211 files
909 links
Think outside the box
Download Telegram
codeby.games room web: Profiler

Bu taskni ishlash uchun ushbu malumotni o'qib chiqing: https://pkg.go.dev/net/http/pprof


#Preparation #For #CTF
1
codeby.games room web: Strange server

Taskni ko'rganimda /hello_world va /robots.txt qanaqadir hint bo'lsa kerak deb o'yladim va FUZZING orali directiory izladim. Ammo hech qanday natija bo'lmadi. Shunda qanday zaiflik turi borligini aniqlash uchun har xil payloadlar ishlata boshladim va SSTI uchun payload ishlatdim va ijoyib natija oldim: {{7*7}}

Ushbu payload 'id' buyrug'ini bajarish uchun ishlatiladi: {{ self.init.globals.builtins.import('os').popen('id').read() }}

Biz .popen('id') —> id o'rniga boshqa buyruqlardan foydalanib flagni izlashimiz kerak.

#Preparation #For #CTF
👍1
Forwarded from Cat Seclist
HTB_CPTS.zip
134 MB
HTB Certified Penetration Testing Specialist (HTB CPTS)
Forwarded from Похек (Сергей Зыбнев)
❗️ RCE через git clone ❗️
CVE-2024-32002

Сложность эксплуатации: простая
#RCE #CVE #git

⚠️ Читать в Teletype

🌚 @poxek
Please open Telegram to view this post
VIEW IN TELEGRAM
Hacking WordPress Sites for up to $10,000!

https://www.youtube.com/watch?v=bX5ZnNgmegY
codeby.games room web: File sharing

Vulenrability Type: File Upload

Taskni ko'rganimda shell yuklash kerakligi aniq edi ammo shell yuklaganimda hech qanday natija bermadi. Keyin platformada shu taskni bajarish uchun source code sifatida task.zip fayli berilgan. Ekan ichidagi kodlarni ko'rib chiqdim

Va .htaccess-da x-httpd-php kabi fayl turiga ruxsat beruvchi qiziqarli code topildi va server PHP skriptlari kabi fayllarni qayta ishlaydi.

Avvaliga https://github.com/pentestmonkey/php-reverse-shell ushbu shellni yukladim ammo yana men kutilgan natijani olmadim. Shundan so'ng boshqa shell izladim va ajoyib shell topdim: https://github.com/flozz/p0wny-shell

Biz shellni shell.php emas balki shell.x-httpd-php qilib o'zgartirishimiz kerak.

#Preparation #For #CTF
👍3