NSEs – Telegram
NSEs
1.14K subscribers
110 photos
15 videos
58 files
180 links
Where Network meets Red Team 🎯
If you're into PenTesting, Hacking, and Cyber Shenanigans — you're home!
🧠 Learn • 🚀 Hack • 🧩 Quiz • 📚 Books • 😁 Memes
Download Telegram
Forwarded from GO-TO CVE
CVE-2024-12877-week-66.pdf
1002 KB
🎯 CVE-2024-12877 Review – GiveWP goes unserialize()… Hello RCE! ⚡️🔥
Hello hackers, bug hunters, and curious minds! Welcome to Episode 66 of the GO-TO CVE series! 🎙💻

This week we’re cracking open a classic PHP Object Injection inside GiveWP, one of the most popular WordPress donation plugins. 🕳🐘

🔹 Week: 66
🔹 CVE: CVE-2024-12877
🔹 Type: PHP Object Injection
🔹 Target: GiveWP (WordPress Plugin)

📌 What’s the story?
GiveWP uses PHP’s notorious unserialize() on user input. That means attackers can drop in a crafted serialized payload, and PHP will happily invoke magic methods like __wakeup() — executing attacker-controlled logic without warning.

👾 What’s the impact?

Remote Code Execution (RCE) 🚀
Sensitive data theft (donors, users, configs) 🕵️‍♂️
Privilege escalation across WordPress 🔑
Full server compromise ☠️

💡 Lesson learned: Regex checks won’t save you. The real fix? Never unserialize untrusted input.

📬 Stay tuned with GO-TO CVE for a fresh bug every week:
👉 https://news.1rj.ru/str/GOTOCVE

#week_66
🔥91🕊1💯1🤣1
This media is not supported in your browser
VIEW IN TELEGRAM
🔥81🕊1💯1
Threat Research with Obsidian for SOC Analysts

- Threat Research for SOC Analysts - The Vault
- Videos & Screenshots
- Workflow: Creating a case and adding artifacts (IP address, domain etc)
- Workflow: Enrich Artifacts withContext

CHANNEL     
GROUP
DISCORD
1311❤‍🔥1💯1
This media is not supported in your browser
VIEW IN TELEGRAM
81❤‍🔥1🕊1💯1
اول تحقیق کنید https://mega.io/ چی هستش بعدش با استفاده از https://meawfy.com/ داخلش Crawl و جستجو کنید( به خیلی چیزا برمیخورید استفاده درست کنید 😁)
#osint

CHANNEL     
GROUP
DISCORD
91😁1🕊1💯1
This media is not supported in your browser
VIEW IN TELEGRAM
71🕊1💯1
یکی از قابلیت های حساب های پرو و اکادمیک تو شودان این هستش که میتونید تو سرچتون از VULN استفاده کنید و تارگت هایی با اسیب پذیری خاصی که میخواید پیدا کنید .
امروز به یه چیزی برخوردم جالب بودش که بدون حساب پرو یا اکادمیک بتونید از قابلیت VULN استفاده کنید با استفاده از دورک زیر
site:shodan.io intext:(CVE مورد نظرتون)

برای مثال
site:shodan.io intext:CVE-2025-26465


CHANNEL     
GROUP
DISCORD
131🤔1🕊1💯1
This media is not supported in your browser
VIEW IN TELEGRAM
91👌1🕊1
Forwarded from GO-TO CVE
CVE-2025-44148-Week-67.pdf
340.7 KB
🎯 CVE-2025-44148 Review – MailEnable Webmail goes boom with Reflected XSS!

Hello hackers, bug hunters, and curious minds! Welcome to another episode of the GO-TO CVE series!

This week we’re looking at a juicy Reflected Cross-Site Scripting (XSS) in MailEnable Webmail, a widely used Windows-based mail server platform. 📬

🔹 Week: 67
🔹 CVE: CVE-2025-44148
🔹 Type: Reflected XSS
🔹 Target: MailEnable (Webmail < v10)

📌 What’s the story?
MailEnable’s failure.aspx page doesn’t properly sanitize user input in the state parameter. That means attackers can inject JavaScript directly into the page response. Once clicked, the payload reflects back into the victim’s browser — executing code in their session. 🚨

📬 Stay tuned with GO-TO CVE for a fresh bug every week:
👉 https://news.1rj.ru/str/GOTOCVE

#week_67
🔥1121🕊1💯1
This media is not supported in your browser
VIEW IN TELEGRAM
🔥72🕊1💯1
TYPES OF VLANs

CHANNEL     
GROUP
DISCORD
101🕊1💯1
This media is not supported in your browser
VIEW IN TELEGRAM
🔥62👌1🕊1
This media is not supported in your browser
VIEW IN TELEGRAM
72🔥1💯1
This media is not supported in your browser
VIEW IN TELEGRAM
🔥93🕊1💯1
اگه میخواید وارد فیلد اوسینت بشید یا حتی وارد شدید، پیشنهاد میکنم این پست رو حتما بخونید که اوسینت رو با چیز دیگه ای اشتباه نگیرید و دید درستی نسبت بهش داشته باشید
Stop Calling It OSINT

https://www.dutchosintguy.com/post/stop-calling-it-osint

CHANNEL     
GROUP
DISCORD
121🔥1🕊1🐳1
This media is not supported in your browser
VIEW IN TELEGRAM
91🕊1🐳1
Forwarded from The Chaos
Top 10 Most Dangerous Active Directory Attack Methods.pdf
1.4 MB
✏️ مقاله تالیف شده
Top 10 Most Dangerous Active Directory Attack Methods

📚برخی از سرفصل ها

📗بخش اول: Active Directory (AD)

📕بخش دوم: توضیح ۱۰ مورد از خطرناک‌ترین روش حمله به Active Directory
به همراه معرفی ابزار های هر مورد

📘بخش سوم : راهبردهای جامع برای افزایش امنیت Active Directory

🔖بخش چهارم : ساخت یک دفاع مقاوم در برابر حملات Active Directory


✍️نویسنده
@TryHackBox | The Chaos

#AC #Acrive_Directory #Cybersecurity
161🕊1🐳1
This media is not supported in your browser
VIEW IN TELEGRAM
91🕊1🐳1
Have you pre-registered for The Gauntlet: Echo Response?
👉 https://offs.ec/45UMmGH

💥 8 missions
🏆 $100,000 in prizes
🎮 Free to enter
🎯 Bonus points for first PWN
1011🔥1🐳1