Dot Dot Semicolon RCE
https://thehackingfactory.com/dot-dot-semicolon-rce
#Java
#RCE
#BugBounty
@web_priv8
https://thehackingfactory.com/dot-dot-semicolon-rce
#Java
#RCE
#BugBounty
@web_priv8
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Demo https://youtu.be/WLurj5Lg8cI
https://github.com/r3curs1v3-pr0xy/vajra
#Tool
#Recon
#BugBounty
@web_priv8
Demo https://youtu.be/WLurj5Lg8cI
https://github.com/r3curs1v3-pr0xy/vajra
#Tool
#Recon
#BugBounty
@web_priv8
Forwarded from ناویا، ماشین کاوش اپلای
ارائههای امسال آفسکانف هماکنون از یوتیوب قابل دسترس است.
THE ULTIMATE GUIDE TO FINDING AND ESCALATING XSS BUGS
https://www.bugcrowd.com/blog/the-ultimate-guide-to-finding-and-escalating-xss-bugs/
#XSS
@web_priv8
https://www.bugcrowd.com/blog/the-ultimate-guide-to-finding-and-escalating-xss-bugs/
#XSS
@web_priv8
Finding Broken Access Controls
https://threat.tevora.com/finding-broken-access-controls/amp/
#IDOR
#BurpSuite
#BugBountyTip
@web_priv8
https://threat.tevora.com/finding-broken-access-controls/amp/
#IDOR
#BurpSuite
#BugBountyTip
@web_priv8
Threat Blog
Finding Broken Access Controls
This blog post is intended to be a guide on effective and efficient methods of identifying broken access control. This is not an end-all-be-all guide and explanation of broken access controls. What Are Access Controls?Access controls are policies put in place…
IDOR vulnerability automation using Autorize and AutoRepeater
https://www.youtube.com/watch?v=3K1-a7dnA60
#IDOR
#BurpSuite
#BugBountyTip
@web_priv8
https://www.youtube.com/watch?v=3K1-a7dnA60
#IDOR
#BurpSuite
#BugBountyTip
@web_priv8
YouTube
Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)
Have you ever wondered how hackers find and exploit IDOR (Insecure Direct Object Reference)?
In this video STÖK get schooled by Fisher who shows him how to setup and hunt for IDORS using BURP Suite & plugins like Autorize and AutoRepeter.
Fisher:
https:…
In this video STÖK get schooled by Fisher who shows him how to setup and hunt for IDORS using BURP Suite & plugins like Autorize and AutoRepeter.
Fisher:
https:…
توی پنتست شبکه های داخلی یه سازمان ممکنه دسترسی مارو به اینترنت محدود کرده باشن، بعضی مواقع ما میتونیم اطلاعات رو از طریق ارتباط DNS ارسال کنیم، البته برای آسیب پذیری های وب هم مثل Blind Command Injection میتونه کارآمد باشه.
https://www.go350.com/posts/exfiltrate-files-using-the-dns/
#DNS
#Blind
#RedTeam
@web_priv8
https://www.go350.com/posts/exfiltrate-files-using-the-dns/
#DNS
#Blind
#RedTeam
@web_priv8
Go350
Exfiltrate files using the DNS
yes you can
https://medium.com/@syedabuthahir/django-debug-mode-to-rce-in-microsoft-acquisition-189d27d08971
#RCE
#Redis
#Django
@web_priv8
#RCE
#Redis
#Django
@web_priv8
Medium
Django debug mode to RCE in Microsoft acquisition
As usual I was doing recon using Censys (https://censys.io/) and Shodan (https://www.shodan.io/). I was looking for Django debug mode…
File Upload Attacks(Part1)
https://blog.yeswehack.com/yeswerhackers/exploitation/file-upload-attacks-part-1/
#Upload
@web_priv8
https://blog.yeswehack.com/yeswerhackers/exploitation/file-upload-attacks-part-1/
#Upload
@web_priv8
تبدیل Blind SSRF به RCE با استفاده از پروتکل Gopher و سرویس Redis در نهایت هم 15 هزار دلار بانتی
https://sirleeroyjenkins.medium.com/just-gopher-it-escalating-a-blind-ssrf-to-rce-for-15k-f5329a974530
#RCE
#SSRF
#Blind
#BugBounty
@web_priv8
https://sirleeroyjenkins.medium.com/just-gopher-it-escalating-a-blind-ssrf-to-rce-for-15k-f5329a974530
#RCE
#SSRF
#Blind
#BugBounty
@web_priv8
Medium
Just Gopher It: Escalating a Blind SSRF to RCE for $15k — Yahoo Mail
Part 1: Recon