Forwarded from Похек (Сергей Зыбнев)
CVE-2024-32002
Сложность эксплуатации: простая
#RCE #CVE #git
Please open Telegram to view this post
VIEW IN TELEGRAM
Teletype
RCE через git clone
CVE-2024-32002 Сложность эксплуатации: простая\n#RCE #CVE #git
codeby.games room web: File sharing
Vulenrability Type: File Upload
Taskni ko'rganimda shell yuklash kerakligi aniq edi ammo shell yuklaganimda hech qanday natija bermadi. Keyin platformada shu taskni bajarish uchun source code sifatida task.zip fayli berilgan. Ekan ichidagi kodlarni ko'rib chiqdim
Va .htaccess-da x-httpd-php kabi fayl turiga ruxsat beruvchi qiziqarli code topildi va server PHP skriptlari kabi fayllarni qayta ishlaydi.
Avvaliga https://github.com/pentestmonkey/php-reverse-shell ushbu shellni yukladim ammo yana men kutilgan natijani olmadim. Shundan so'ng boshqa shell izladim va ajoyib shell topdim: https://github.com/flozz/p0wny-shell
Biz shellni shell.php emas balki shell.x-httpd-php qilib o'zgartirishimiz kerak.
#Preparation #For #CTF
Vulenrability Type: File Upload
Taskni ko'rganimda shell yuklash kerakligi aniq edi ammo shell yuklaganimda hech qanday natija bermadi. Keyin platformada shu taskni bajarish uchun source code sifatida task.zip fayli berilgan. Ekan ichidagi kodlarni ko'rib chiqdim
Va .htaccess-da x-httpd-php kabi fayl turiga ruxsat beruvchi qiziqarli code topildi va server PHP skriptlari kabi fayllarni qayta ishlaydi.
Avvaliga https://github.com/pentestmonkey/php-reverse-shell ushbu shellni yukladim ammo yana men kutilgan natijani olmadim. Shundan so'ng boshqa shell izladim va ajoyib shell topdim: https://github.com/flozz/p0wny-shell
Biz shellni shell.php emas balki shell.x-httpd-php qilib o'zgartirishimiz kerak.
#Preparation #For #CTF
👍3
Forwarded from 🇺🇿ONESEC Кибербезопасность
Друзья, приглашаем вас на бесплатные открытые уроки по кибербезопасности в IT-академии Ustudy уже в это воскресенье!
🗓Дата : 26 мая
⌛️Время: 15:00
🗺Адрес: город Ташкент, улица Муминова 7/2 (3 этаж)
📍Место проведение: IT- академия Ustudy (Внутри здания Министерства цифровых технологий)
⚡️ЗАПИСАТЬСЯ⚡️
__________
Do'stlar, biz sizni Ustudy IT Akademiyasida yakshanba kuni boladigan kiberxavfsizlik bo'yicha bepul ochiq darslarga taklif qilamiz!
🗓Sana: 26-may
⌛️Vaqt: 15:00
🗺Manzil: Toshkent shahri. Mo'minova ko'chasi 7/2 (3-qavat)
📍Makon: Ustudy IT Academy (Raqamli texnologiyalar vazirligi binosi ichida)
⚡️Ro'yxatdan o'tish⚡️
🗓Дата : 26 мая
⌛️Время: 15:00
🗺Адрес: город Ташкент, улица Муминова 7/2 (3 этаж)
📍Место проведение: IT- академия Ustudy (Внутри здания Министерства цифровых технологий)
⚡️ЗАПИСАТЬСЯ⚡️
__________
Do'stlar, biz sizni Ustudy IT Akademiyasida yakshanba kuni boladigan kiberxavfsizlik bo'yicha bepul ochiq darslarga taklif qilamiz!
🗓Sana: 26-may
⌛️Vaqt: 15:00
🗺Manzil: Toshkent shahri. Mo'minova ko'chasi 7/2 (3-qavat)
📍Makon: Ustudy IT Academy (Raqamli texnologiyalar vazirligi binosi ichida)
⚡️Ro'yxatdan o'tish⚡️
I uploaded all best payloads list some prsnl some public that will help you in Bug Hunting..
https://github.com/coffinxp/payloads
https://github.com/coffinxp/payloads
GitHub
GitHub - coffinxp/payloads
Contribute to coffinxp/payloads development by creating an account on GitHub.
🚨LazyEgg - Hunting JS Files🚨
💥Command: waybackurls target | grep '\.js$' | awk -F '?' '{print $1}' | sort -u | xargs -I{} bash -c 'echo -e "\ntarget : {}\n" && python lazyegg[.]py "{}" --js_urls --domains --ips'
🔗Download https://lnkd.in/gnRJ5mzw
#BugBounty
💥Command: waybackurls target | grep '\.js$' | awk -F '?' '{print $1}' | sort -u | xargs -I{} bash -c 'echo -e "\ntarget : {}\n" && python lazyegg[.]py "{}" --js_urls --domains --ips'
🔗Download https://lnkd.in/gnRJ5mzw
#BugBounty
👍2
codeby.games room web: Pickled cucumber
The resource used to run the task: https://davidhamann.de/2020/04/05/exploiting-python-pickle/
#CTF #Writeup
The resource used to run the task: https://davidhamann.de/2020/04/05/exploiting-python-pickle/
#CTF #Writeup
🗿3