SecList for CyberStudents
239 subscribers
598 photos
24 videos
211 files
908 links
Think outside the box
Download Telegram
CVE-2024-40348
*
Bazaar < v1.4.3 обход каталога
*
POC+scanner
*
👍1
🚀 Apepe - Mobile application  pentesting🚀

🕵️ Apepe is a Python tool developed to help pentesters and red teamers to easily get information from the target app. This tool will extract basic informations as the package name, if the app is signed and the development language...

🧾 Source - github.com/oppsec/Apepe
👍1
❗️CrowdStrike ning Falcon dasturidagi yangilanish bilan bog'liq muammosi, endi Linux OS ga ta'sir qilib, kernel panic'ni keltirib chiqarmoqda

CrowdStrike-ning Falcon Sensor dasturining yangilanishi tufayli yuzaga kelgan apokalipsis tarqalishda davom etmoqda. Dasturiy ta'minot Windows operatsion tizimida ishlaydigan 8,5 million kompyuterni o'chirib qo'yganidan xabaringiz bor. Endi Linux OS bazasidagi kompyuterlar va serverlarining ham ishdan chiqishiga sabab bo'lmoqda.

Red Hat o'z mijozlarini falcon dasturining "5.14.0-427.13.1.el9_4.x86_64" sonini yuklagandan so'ng "Kernel Panic" muammosi kelib chiqqani haqida ogohlantirdi.

CrowdStrike Falcon Sensor/Agent bilan bog'liq ikkinchi muammo "cshook_network_ops_inet6_sockraw_release+0x171a9" tizimni ishdan chiqarishi mumkinligi takidlangan. Red Hat xavfsizlik jamoasi "Falcon Sensor/Agent" dasturiy ta'minotini vaqtinchalik ishlatmaslik, yuqoridagi muammolarga uchramaslikni ta'minlashini aytgan.

The Register jurnali esa huddi shu muammo Debian va Rocky Linuxlarda ham uchraganini aytishgan.

Fursatdan foydalangan kiberjinoyatchilar, CrowdStrike kompaniyasi nomidan "muammoni bartaraf qilish uchun tarqatilgan yangilanish" niqobida hackerlik guruhlari bir qator domenlarni ochib, ommaviy zararli yangilanishni faol tarqatishmoqda.

crowdstrikebluescreen.com crowdstrikeØday.com crowdstrike-bsod.com crowdstrikedoomsday.com crowdstrikedoomsday.com crowdstrikefix.com crowdstrikedown.site crowdstriketoken.com


Bu muammo soha mutaxassislari orasida shu qadar ko'p va keng muhokama qilinmoqdaki, xar qanday mavzudagi xazillarni CrowdStrike bilan bog'lashmoqda, AI orqali she'rlar yozilmoqda, memlar soni esa cheksiz)). Birjadagi narxlarning qulashi fonida kompaniya rahbari bir qator xodimlarni ishdan bo'shatganini ham X da yozishmoqda. "blue screen of death" shu paytgacha "BSOD" bo'lgan bo'lsa, endi "BSODStrike" termini ham paydo bo'ldi 😁
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
BBRF-Client: The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices.

https://github.com/honoki/bbrf-client/

#Recon
👍1
👍1
Hammaga salom do'stlar anchadan buyon ishlar ko'payib post yozmay qoygandim. Bu kanalda asosan kiber xavfsizlikni o'rganishga doir materiallar tashlab boriladi. Asosan o'zim ish davomida zaifliklarni topsishda yani pentesting va bugbounty qanday materiallardan foydalanayotganim haqida postlar tashlayman.

Shu o'rinda bugun bir necha zaifliklarga duch keldim va shuni sizlar bilan baham ko'rmoqchiman!

XSS via File upload vulnerability:
Odatda juda funksinalliklarga yani userlar bilan ishlashga mo'ljallangan platformalarda malum bir shaxsni tasdiqlovchi hujjatlar talab qilinishini va qanday turdagi fayllarni yuklash kerakligiga etibor bering! Shunda qanday qilib ushbu fayl turlarini bypass qilib shell yuklashga hamda uni RCE ga aylantirishga harakat qiling.

Bugun xuddi shu narsaga etibor bermaganligim uchun faqatgina PDF ichiga JS payload inject qilib stored XSS zaifligini topdim. Aslida undan ham katta natijaga erishishim mumkin edi, ammo etiborsizligim tufayli oddiy bir narsani unitib qo'ydim. Shunda kasbdoshim kelib qoldi XSS uchun payload emas balki php shell yuklashim kerakligini aytdi. Shunda requstni BurpSuite orqali ushlab pdf fayl ichiga php payload yozdik va uni serverga yukladik. Shunda php payloadimiz ishladi va RCE olishga muavaffaq bo'ldik😎

Ushbu malumotlar o'zimning xatolarimni esdan chiqarmaslik va sizlarnig rivojlanishigizga ozgina bo'lsa ham hissa qo'shish maqsadida yozildi.
🔥3🤣21😐1
🇨🇦Canadian OSINT🇨🇦

- business and corporate info
- archives and genealogy
- legal and court info
- people search

and more (dozens of resources).

https://github.com/S3V3N11S/Canadian-OSINT-

Contributor Jason Colborne
👍1
add this file to your wordlist .gitlab-ci.yml , enjoy
its contain a database username and password

#bugbounty #bugbountytips
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
Ciphey

#decode #crack #crypto #Pentest

Автоматически расшифровывайте шифры без знания ключа или шифра, декодируйте кодировки и взламывайте хеши. Если вы мало что знаете о криптографии или хотите быстро проверить зашифрованный текст, прежде чем работать с ним самостоятельно, Ciphey идеально подойдет вам.

Ciphey использует специально созданный модуль искусственного интеллекта (AuSearch) с интерфейсом обнаружения шифров, чтобы приблизительно определить, чем что-то зашифровано. А затем, настраиваемый интерфейс проверки языка, помогает собрать из приблизительного текста — истинный.

Ссылка на инструмент.

Ссылка на документацию.

LH | Новости | Курсы | Мемы

#рекомендация
#рекомендации
👍1
🚨 Depix 👉 It is a free and open-source tool used for image steganography, specifically for extracting hidden data from images.

🔗Download :
https://github.com/spipm/Depix

#bugbounty #bugbountytips
🔥2👍1
Forwarded from Похек (Сергей Зыбнев)
api-fuzzing-lists.zip
8.7 MB
API FUZZING LISTS

Вне очереди пост, очень вкусный сборник фаззинг вордлистов для API

Описание данного списка от автора:
744,000+ endpoints
357,000+ object properties
211,000+ object names
127,000+ query parameters
74,000+ parameter values
35,000+ path parameters
8,300+ headers
5,300+ paths
880+ common ports

Взял ТУТ

🌚 @poxek | 📹 YouTube
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Forwarded from SecuriXy.kz
#CVE-2024-22274: Privilege Escalation: #VMware #vCenter Server Authenticated #RCE

https://github.com/l0n3m4n/CVE-2024-22274-RCE
👍1