KS note – Telegram
KS note
495 subscribers
61 photos
2 files
71 links
・ Web3 & etc.

🥷⛓️🍷 @MostPow3rful
Download Telegram
2️⃣1️⃣ #ETHERNAUT #level_21 #Shop

🥷🍷 <Happy Hacking/>
❤‍🔥11🏆1🦄1
Forwarded from Programmer Jokes
🆒4🔥1
👓 Recording all the emitted events - Explained The Foundry Book's Example

⚠️ import {Vm} from "lib/forge-std/src/Vm.sol";

🔗 https://book.getfoundry.sh/cheatcodes/record-logs
👾85🔥1
Forwarded from GO-TO CVE
CVE-2023-46943-week-18.pdf
1.1 MB
بررسی آسیب‌پذیری CVE-2023-46943 👨‍💻

سلام به همه دوستان عزیز! 🌟

خوش آمدید به برنامه هفته 18 از تحلیل آسیب‌پذیری‌های hashtag#GOTOCVE. این هفته به بررسی آسیب‌پذیری مهم CVE-2019-15107 پرداخته‌ایم که مربوط به webmin و آسیب پذیری RCE روی این پلتفروم کنترول سرویس وب است برای برسی بیشتر با ما همراه باشید.

👾 Week: 18
🔍 CVE: CVE-2019-15107
📊 Type: RCE
🛠 CMS: Webmin

در این برنامه، به جزئیات آسیب‌پذیری، روش‌های اکسپلویت و تکنیک‌های پیشگیری از آن خواهیم پرداخت ایم.

رای پیوستن به کانال تلگرام ما و دریافت آخرین اخبار و به‌روزرسانی‌ها، از لینک زیر استفاده کنید:
🔗 پیوستن به کانال تلگرام
https://news.1rj.ru/str/GOTOCVE💫

مقالات ما را نیز می‌توانید در وب‌سایت زیر دنبال کنید:
🔗 مطالعه مقالات
https://lnkd.in/dFFCY5Kn


نویسندگان:
• Maha
• Mostpow3rful
• Parsa Momeni
• Fazel Mohammad Ali Pour
• Reza Olfat
• Ali Soltani
7🔥3
🆒3🦄2🔥1
🍾 Finally! pwned "Locked and Loaded" Blockchain Challenge At HTB & Solved All the blockchain challenges (Non-VIP)

🔗 X
🔗 Linkedin
🍾9❤‍🔥21
Forwarded from Ali Soltani
🔐 Join the GO-TO CVE Channel! 🔐

Every week, we take a deep dive into the latest CVE vulnerabilities, explaining how they work and how to protect against them. We also share custom exploits and pentesting techniques to help you understand the vulnerabilities better. Additionally, we cover SOC (Security Operations Center) strategies and provide insights on malware analysis regularly. Stay informed, stay secure! 🚨

👉 If you’re passionate about cybersecurity or just want to stay ahead of the latest threats, this is the place for you. Let’s build a safer tomorrow together!

Join us now and be part of the conversation:
🔗 https://news.1rj.ru/str/GOTOCVE
🔥4🙏1
1️⃣5️⃣ #ETHERNAUT #level_15 #Naught_Coin

before call the exploit function, don't forgot to call approve() :
cast send $TARGET_CONTRACT_ADDRESS "approve(address,uint256)" EXPLOIT_CONTRACT_ADDRESS 1000000000000000000000000 --private-key $PRIVATE_KEY --rpc-url $SEPOLIA_RPC_URL


🥷🍷 <Happy Hacking/>
😈12🔥1👌1
🔥14🏆3🐳21👾1
Forwarded from GO-TO CVE
🎉 Thank You for Joining Us on Our 24-Week Journey of Cybersecurity Awareness! 🔒

I want to express my heartfelt gratitude to everyone who has been with us throughout this journey. Your support and engagement have been invaluable! Let's continue to learn and grow together in the world of cybersecurity.

Stay safe and vigilant! 💪

👉 Join the community!
https://news.1rj.ru/str/GOTOCVE/

#GOTOCVE #CyberSecurity #Awareness #InfoSec
🔥5