CVE-2024-50550: Privilege Escalation in LiteSpeed Cache WP Plugin, 8.1 rating π₯
Weak security hash verification vulnerability allows an attacker to gain administrative privileges.
Search at Netlas.io:
π Link: https://nt.ls/A60iV
π Dork: http.body:"plugins/litespeed-cache"
Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
Weak security hash verification vulnerability allows an attacker to gain administrative privileges.
Search at Netlas.io:
π Link: https://nt.ls/A60iV
π Dork: http.body:"plugins/litespeed-cache"
Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
π3
Brut Security
Best Motivation Tip Ever
But Our Bro is Killing It ππ Happy Diwali and π
πΏ12π₯5π1π³1
CVE-2024-49768: Race Condition in Waitress Python server, 9.1 rating π₯
Due to an error, the server can process a request even if the connection should have been closed.
Search at Netlas.io:
π Link: https://nt.ls/VYS9t
π Dork: http.headers.server:"waitress"
Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
Due to an error, the server can process a request even if the connection should have been closed.
Search at Netlas.io:
π Link: https://nt.ls/VYS9t
π Dork: http.headers.server:"waitress"
Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
π2πΏ2
Setup and host your own blind XSS and SSRF testing tool for free https://github.com/Rahim7X/Argus.git
2π₯9π2
π‘οΈ List of Websites Giving Free RDP/VPS π₯οΈ
πΉ sadd.io π
πΈ vpswala.org π
πΉ ihor.ru π»
πΈ gratisvps.net π
πΉ ionos.com βοΈ
πΈ vultr.com βοΈ
πΉ skysilk.com π
πΈ yellowcircle.net π
πΉ apponfly.com/en π²
πΈ cloudsigma.com π
πΉ ezywatch.com/freevps πΉοΈ
πΈ digitalocean.com π³
πΉ ctl.io/free-trial π
πΈ developer.rackspace.com π οΈ
πΉ my.letscloud.io/sign-up β¨
πΈ ohosti.com/vpshosting.php π
πΉ neuprime.com/l_vds3.php π₯οΈ
π Note: Some websites may require π³ credit card verification for trial access.
πΉ sadd.io π
πΈ vpswala.org π
πΉ ihor.ru π»
πΈ gratisvps.net π
πΉ ionos.com βοΈ
πΈ vultr.com βοΈ
πΉ skysilk.com π
πΈ yellowcircle.net π
πΉ apponfly.com/en π²
πΈ cloudsigma.com π
πΉ ezywatch.com/freevps πΉοΈ
πΈ digitalocean.com π³
πΉ ctl.io/free-trial π
πΈ developer.rackspace.com π οΈ
πΉ my.letscloud.io/sign-up β¨
πΈ ohosti.com/vpshosting.php π
πΉ neuprime.com/l_vds3.php π₯οΈ
π Note: Some websites may require π³ credit card verification for trial access.
π13
Find sensitive files using Wayback
#bugbountytip #bugbounty #bugbountytips
waybackurls 123.com | grep - -color -E "1.xls | \\.tar.gz | \\.bak | \\.xml | \\.xlsx | \\.json | \\.rar | \\.pdf | \\.sql | \\.doc | \\.docx | \\.pptx | \\.txt | \\.zip | \\.tgz | \\.7z"
#bugbountytip #bugbounty #bugbountytips
1π13β€4π₯3
a XSS payload with Alert Obfuscation, for bypass Regex filter
#infosec #cybersec #bugbountytip
<img src="X" onerror=top[8680439..toString(30)](1337)>
<script>top[8680439..toString(30)](1337)</script>
#infosec #cybersec #bugbountytip
β€11π6
Reduce Noise in Burp Suite with This Simple Trick! π₯
π‘ Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
If you have any other filters to do share, drop it on comments!
π‘ Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
.*\.google\.com
.*\.gstatic\.com
.*\.googleapis\.com
.*\.pki\.goog
.*\.mozilla\..*
If you have any other filters to do share, drop it on comments!
1β€15π9
AZURE_OPENAI_API_KEY /[a-f0-9]{32}$//ATATT3[a-zA-Z0-9_\-+=]{184,195}$/#CyberSecurity #BugBounty #infosec #BugBountyTools #pentest #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
π4β€1
Check for Subdomain Takeover Vulnerabilities
This enumerates subdomains and checks if they resolve. Subdomains that return NXDOMAIN may be vulnerable to takeover if they point to external services.
Replace nasa.gov with your target.
This enumerates subdomains and checks if they resolve. Subdomains that return NXDOMAIN may be vulnerable to takeover if they point to external services.
subfinder -d target.com -silent | while read sub; do host $sub; done | grep "NXDOMAIN"
Replace nasa.gov with your target.
π12πΏ6
Hey everyone!
- Access challenging, real-world environments to hone your skills.- Tackle new labs like Odyssey and Ascension as they roll out.
- Join a community of dedicated hackers pushing their skills to new heights.
Letβs hack and learn together!
Please open Telegram to view this post
VIEW IN TELEGRAM
π3β€2π₯1
1.Use Katana to scan for document URLs:
katana -u subdomainsList -em pdf,docx | tee endpointsPDF_DOC
2. Filter for potentially unredacted files:
grep -i 'redacted.*\.pdf$' endpointsPDF_DOC | sed -E 's/[-_]?redacted//gi' | sort -u | httpx -mc 200 -sc
This script finds document URLs with "redacted" in the name, strips it out, and checks if the unredacted version is accessible.
Admins often leave these unredacted files online by mistake, making them a high-medium (P3) severity finding for bug bounty programs.
Please open Telegram to view this post
VIEW IN TELEGRAM
1β€14π5
π¨CVE-2024-51482: A 10/10 Severity Vulnerability Exposes ZoneMinderβs SQL Databases
πDorks
HUNTER:/product.name="ZoneMinder"
SHODAN: http.favicon.hash:-1218152116
FOFA: app="ZoneMinder"
π°Refer: https://securityonline.info/zoneminders-cve-2024-51482-a-10-10-severity-vulnerability-exposes-sql-databases/
#ZoneMinder #SQL #hunterhow #infosec #infosecurity #OSINT #Vulnerability
πDorks
HUNTER:/product.name="ZoneMinder"
SHODAN: http.favicon.hash:-1218152116
FOFA: app="ZoneMinder"
π°Refer: https://securityonline.info/zoneminders-cve-2024-51482-a-10-10-severity-vulnerability-exposes-sql-databases/
#ZoneMinder #SQL #hunterhow #infosec #infosecurity #OSINT #Vulnerability
2π7β€2
If youβre new to malware development, this playlist is a solid introduction! It covers:
β’ Native API
β’ A quick refresher on processes, threads, and handles
β’ Syscalls
Check it out here: YouTube Playlist
β’ Native API
β’ A quick refresher on processes, threads, and handles
β’ Syscalls
Check it out here: YouTube Playlist
π₯9
This media is not supported in the widget
VIEW IN TELEGRAM
πΏ31π³5π4