Forwarded from Deleted Account
The Linux Kernel Module Programming Guide.pdf
538.6 KB
The Linux Kernel Module Programming Guide
fileless malware all you need to know
https://esentry.xyz/fileless-malware-all-you-need-to-know/
https://esentry.xyz/fileless-malware-all-you-need-to-know/
You can be a kernel hacker!
https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/
https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/
Forwarded from Bug Bounty (Amir Kiani)
YouTube
BSidesMCR 2018: Practical Web Cache Poisoning: Redefining 'Unexploitable' by James Kettle
Request Encoding to bypass web application firewalls
https://soroush.secproject.com/blog/2017/09/additional-notes-on-a-forgotten-http-invisibility-cloak-talk/
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/request-encoding-to-bypass-web-application-firewalls/
https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour
https://soroush.secproject.com/blog/2017/09/additional-notes-on-a-forgotten-http-invisibility-cloak-talk/
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/request-encoding-to-bypass-web-application-firewalls/
https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour
SlideShare
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
The document discusses various techniques for bypassing Web Application Firewalls (WAFs) using HTTP standards and web server behaviors, focusing on methods such as HTTP smuggling, payload mutations, and request encoding challenges. It highlights the effectiveness…
Bug Bounty
https://www.youtube.com/watch?v=iSDoUGjfW3Q
HackerOne
GSA Bounty disclosed on HackerOne: Defacement of catalog.data.gov...
An attacker can deface various pages on catalog.data.gov, leading to them executing malicious JavaScript when visited by a normal user.
The root problem is that the server trusts the...
The root problem is that the server trusts the...