Forwarded from GO-TO CVE
CVE-2024-12877-week-66.pdf
1002 KB
🎯 CVE-2024-12877 Review – GiveWP goes unserialize()… Hello RCE! ⚡️🔥
Hello hackers, bug hunters, and curious minds! Welcome to Episode 66 of the GO-TO CVE series! 🎙💻
This week we’re cracking open a classic PHP Object Injection inside GiveWP, one of the most popular WordPress donation plugins. 🕳🐘
🔹 Week: 66
🔹 CVE: CVE-2024-12877
🔹 Type: PHP Object Injection
🔹 Target: GiveWP (WordPress Plugin)
📌 What’s the story?
GiveWP uses PHP’s notorious unserialize() on user input. That means attackers can drop in a crafted serialized payload, and PHP will happily invoke magic methods like __wakeup() — executing attacker-controlled logic without warning.
👾 What’s the impact?
Remote Code Execution (RCE) 🚀
Sensitive data theft (donors, users, configs) 🕵️♂️
Privilege escalation across WordPress 🔑
Full server compromise ☠️
💡 Lesson learned: Regex checks won’t save you. The real fix? Never unserialize untrusted input.
📬 Stay tuned with GO-TO CVE for a fresh bug every week:
👉 https://news.1rj.ru/str/GOTOCVE
#week_66
Hello hackers, bug hunters, and curious minds! Welcome to Episode 66 of the GO-TO CVE series! 🎙💻
This week we’re cracking open a classic PHP Object Injection inside GiveWP, one of the most popular WordPress donation plugins. 🕳🐘
🔹 Week: 66
🔹 CVE: CVE-2024-12877
🔹 Type: PHP Object Injection
🔹 Target: GiveWP (WordPress Plugin)
📌 What’s the story?
GiveWP uses PHP’s notorious unserialize() on user input. That means attackers can drop in a crafted serialized payload, and PHP will happily invoke magic methods like __wakeup() — executing attacker-controlled logic without warning.
👾 What’s the impact?
Remote Code Execution (RCE) 🚀
Sensitive data theft (donors, users, configs) 🕵️♂️
Privilege escalation across WordPress 🔑
Full server compromise ☠️
💡 Lesson learned: Regex checks won’t save you. The real fix? Never unserialize untrusted input.
📬 Stay tuned with GO-TO CVE for a fresh bug every week:
👉 https://news.1rj.ru/str/GOTOCVE
#week_66
🔥9☃1🕊1💯1🤣1
Threat Research with Obsidian for SOC Analysts
- Threat Research for SOC Analysts - The Vault
- Videos & Screenshots
- Workflow: Creating a case and adding artifacts (IP address, domain etc)
- Workflow: Enrich Artifacts withContext
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
- Threat Research for SOC Analysts - The Vault
- Videos & Screenshots
- Workflow: Creating a case and adding artifacts (IP address, domain etc)
- Workflow: Enrich Artifacts withContext
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
❤13⚡1☃1❤🔥1💯1
اول تحقیق کنید https://mega.io/ چی هستش بعدش با استفاده از https://meawfy.com/ داخلش Crawl و جستجو کنید( به خیلی چیزا برمیخورید استفاده درست کنید 😁)
#osint
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
#osint
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
MEGA
MEGA: Protect your Online Privacy
Secure and private cloud storage for everyone. Store and share files, chat, meet, back up, sync, and more.
❤9☃1😁1🕊1💯1
یکی از قابلیت های حساب های پرو و اکادمیک تو شودان این هستش که میتونید تو سرچتون از VULN استفاده کنید و تارگت هایی با اسیب پذیری خاصی که میخواید پیدا کنید .
امروز به یه چیزی برخوردم جالب بودش که بدون حساب پرو یا اکادمیک بتونید از قابلیت VULN استفاده کنید با استفاده از دورک زیر
برای مثال
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
امروز به یه چیزی برخوردم جالب بودش که بدون حساب پرو یا اکادمیک بتونید از قابلیت VULN استفاده کنید با استفاده از دورک زیر
site:shodan.io intext:(CVE مورد نظرتون)
برای مثال
site:shodan.io intext:CVE-2025-26465
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
Shodan
Search engine of Internet-connected devices. Create a free account to get started.
❤13☃1🤔1🕊1💯1
Forwarded from GO-TO CVE
CVE-2025-44148-Week-67.pdf
340.7 KB
🎯 CVE-2025-44148 Review – MailEnable Webmail goes boom with Reflected XSS!
Hello hackers, bug hunters, and curious minds! Welcome to another episode of the GO-TO CVE series!
This week we’re looking at a juicy Reflected Cross-Site Scripting (XSS) in MailEnable Webmail, a widely used Windows-based mail server platform. 📬✨
🔹 Week: 67
🔹 CVE: CVE-2025-44148
🔹 Type: Reflected XSS
🔹 Target: MailEnable (Webmail < v10)
📌 What’s the story?
MailEnable’s failure.aspx page doesn’t properly sanitize user input in the state parameter. That means attackers can inject JavaScript directly into the page response. Once clicked, the payload reflects back into the victim’s browser — executing code in their session. 🚨
📬 Stay tuned with GO-TO CVE for a fresh bug every week:
👉 https://news.1rj.ru/str/GOTOCVE
#week_67
Hello hackers, bug hunters, and curious minds! Welcome to another episode of the GO-TO CVE series!
This week we’re looking at a juicy Reflected Cross-Site Scripting (XSS) in MailEnable Webmail, a widely used Windows-based mail server platform. 📬✨
🔹 Week: 67
🔹 CVE: CVE-2025-44148
🔹 Type: Reflected XSS
🔹 Target: MailEnable (Webmail < v10)
📌 What’s the story?
MailEnable’s failure.aspx page doesn’t properly sanitize user input in the state parameter. That means attackers can inject JavaScript directly into the page response. Once clicked, the payload reflects back into the victim’s browser — executing code in their session. 🚨
📬 Stay tuned with GO-TO CVE for a fresh bug every week:
👉 https://news.1rj.ru/str/GOTOCVE
#week_67
🔥11❤2☃1🕊1💯1
اگه میخواید وارد فیلد اوسینت بشید یا حتی وارد شدید، پیشنهاد میکنم این پست رو حتما بخونید که اوسینت رو با چیز دیگه ای اشتباه نگیرید و دید درستی نسبت بهش داشته باشید
Stop Calling It OSINT
https://www.dutchosintguy.com/post/stop-calling-it-osint
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
Stop Calling It OSINT
https://www.dutchosintguy.com/post/stop-calling-it-osint
➖➖➖➖➖
CHANNEL
GROUP
DISCORD
Nico Dekens | Dutch_OSINTguy
Stop Calling It OSINT
A field rant about shortcuts, ego, and other creative ways to waste everyone’s timeLet’s just say the quiet part out loud: most of what’s sold as “OSINT” online is cosplay. It’s people screenshotting shiny dashboards, speed-running Google like a speed-runner…
❤12☃1🔥1🕊1🐳1
Forwarded from The Chaos
Top 10 Most Dangerous Active Directory Attack Methods.pdf
1.4 MB
✏️ مقاله تالیف شده
Top 10 Most Dangerous Active Directory Attack Methods
📚برخی از سرفصل ها
📗بخش اول: Active Directory (AD)
📕بخش دوم: توضیح ۱۰ مورد از خطرناکترین روش حمله به Active Directory
به همراه معرفی ابزار های هر مورد
📘بخش سوم : راهبردهای جامع برای افزایش امنیت Active Directory
🔖بخش چهارم : ساخت یک دفاع مقاوم در برابر حملات Active Directory
✍️نویسنده
@TryHackBox | The Chaos
#AC #Acrive_Directory #Cybersecurity
Top 10 Most Dangerous Active Directory Attack Methods
📚برخی از سرفصل ها
📗بخش اول: Active Directory (AD)
📕بخش دوم: توضیح ۱۰ مورد از خطرناکترین روش حمله به Active Directory
به همراه معرفی ابزار های هر مورد
📘بخش سوم : راهبردهای جامع برای افزایش امنیت Active Directory
🔖بخش چهارم : ساخت یک دفاع مقاوم در برابر حملات Active Directory
✍️نویسنده
@TryHackBox | The Chaos
#AC #Acrive_Directory #Cybersecurity
❤16☃1🕊1🐳1
Have you pre-registered for The Gauntlet: Echo Response?
👉 https://offs.ec/45UMmGH
💥 8 missions
🏆 $100,000 in prizes
🎮 Free to enter
🎯 Bonus points for first PWN
👉 https://offs.ec/45UMmGH
💥 8 missions
🏆 $100,000 in prizes
🎮 Free to enter
🎯 Bonus points for first PWN
OffSec
The Gauntlet: Capture Flags, Climb Leaderboards, Win Big | OffSec
Enter The Gauntlet, our new quarterly Proving Grounds challenge. Compete for free with weekly machine drops, leaderboards, First PWN bonuses, and exclusive prizes.
⚡10❤1☃1🔥1🐳1