Watch "Hacking into Google's Network for $133,337" on YouTube
https://youtu.be/g-JgA1hvJzA
https://youtu.be/g-JgA1hvJzA
YouTube
Hacking into Google's Network for $133,337
In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164,674 in total. This is a crazy bug, because it requires so much knowledge about Google internals. We will learn about Google's Global Software…
New CloudFlare XSS Bypass!
<noscript onload=alert%26%230000000040"1")>
<noscript onload=alert%26%230000000040"1")>
Reproducing n-day vulnerabilities and writing N-day based fuzzer with Qiling | https://devilinside.me/blogs/reproducing-ndays-qiling
devilinside.me
UNLEASH THE BEAST | THE FUTURE
Expect memes, food for thoughts, tech guidelines and trash talk daily.
[webapps] phpPgAdmin 7.13.0 - COPY FROM PROGRAM Command Execution (Authenticated)
https://www.exploit-db.com/exploits/49736
https://www.exploit-db.com/exploits/49736
Exploit Database
phpPgAdmin 7.13.0 - COPY FROM PROGRAM Command Execution (Authenticated)
phpPgAdmin 7.13.0 - COPY FROM PROGRAM Command Execution (Authenticated).. webapps exploit for Multiple platform
Android-PIN-Bruteforce
https://github.com/urbanadventurer/Android-PIN-Bruteforce
https://github.com/urbanadventurer/Android-PIN-Bruteforce
GitHub
GitHub - urbanadventurer/Android-PIN-Bruteforce: Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your…
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb) - urbanadventurer/Android...
Exploiting Windows RPC to bypass CFG mitigation: analysis of CVE-2021-26411 in-the-wild sample
The general method of browser render process exploit is: after exploiting the vulnerability to obtain user mode arbitrary memory read/write primitive, the vtable of DOM/js object is tampered to hijack the code execution flow. Then VirtualProtect is called by ROP chain to modify the shellcode memory to PAGE_EXECUTE_READWRITE, and the code execution flow is jumped to shellcode by ROP chain finally. After Windows 8.1, Microsoft introduced CFG (Control Flow Guard)[1] mitigation to verify the indirect function call, which mitigates the exploitation of tampering with vtable to get code execution.
However, the confrontation is not end. Some new methods to bypass CFG mitigation have emerged. For example, in chakra/jnoscript9, the code execution flow is hijacked by tampering with the function return address on the stack; in v8, WebAssembly with executable memory property is used to execute shellcode. In December 2020, Microsoft introduced CET(Control-flow Enforcement Technology)[2] mitigation technology based on Intel Tiger Lake CPU in Windows 10 20H1, which protects the exploitation of tampering with the function return address on the stack. Therefore, how to bypass CFG in a CET mitigation environment has become a new problem for vulnerability exploitation.
https://iamelli0t.github.io/2021/04/10/RPC-Bypass-CFG.html
The general method of browser render process exploit is: after exploiting the vulnerability to obtain user mode arbitrary memory read/write primitive, the vtable of DOM/js object is tampered to hijack the code execution flow. Then VirtualProtect is called by ROP chain to modify the shellcode memory to PAGE_EXECUTE_READWRITE, and the code execution flow is jumped to shellcode by ROP chain finally. After Windows 8.1, Microsoft introduced CFG (Control Flow Guard)[1] mitigation to verify the indirect function call, which mitigates the exploitation of tampering with vtable to get code execution.
However, the confrontation is not end. Some new methods to bypass CFG mitigation have emerged. For example, in chakra/jnoscript9, the code execution flow is hijacked by tampering with the function return address on the stack; in v8, WebAssembly with executable memory property is used to execute shellcode. In December 2020, Microsoft introduced CET(Control-flow Enforcement Technology)[2] mitigation technology based on Intel Tiger Lake CPU in Windows 10 20H1, which protects the exploitation of tampering with the function return address on the stack. Therefore, how to bypass CFG in a CET mitigation environment has become a new problem for vulnerability exploitation.
https://iamelli0t.github.io/2021/04/10/RPC-Bypass-CFG.html
iamelli0t’s blog
Exploiting Windows RPC to bypass CFG mitigation: analysis of CVE-2021-26411 in-the-wild sample
The general method of browser render process exploit is: after exploiting the vulnerability to obtain user mode arbitrary memory read/write primitive, the vtable of DOM/js object is tampered to hijack the code execution flow. Then VirtualProtect is called…
Exclusive: #RUMINT Rumor Intelligence from Iran 🇮🇷 via Israel 🇮🇱.
Nuclear facility at Natanz, Iran has suffered major damage by an attack.
Rumor 1: Israel launched a cyber attack at the facility.
Rumor 2: Israel used local assets and used explosives (likely a sabotage) and / or cyber tactics during the attack.
Rumor 3: It was an accident.
However, the facility sustained power damage and no nuclear leak occurred, as per reliable source.
Nuclear facility at Natanz, Iran has suffered major damage by an attack.
Rumor 1: Israel launched a cyber attack at the facility.
Rumor 2: Israel used local assets and used explosives (likely a sabotage) and / or cyber tactics during the attack.
Rumor 3: It was an accident.
However, the facility sustained power damage and no nuclear leak occurred, as per reliable source.