Phantasm Lab English Group
🦠 @Phantasm_Lab
Rules of House
- Programming Languages
- Bug Bounty 💷 💵- Open Source & Free Software
- Exploitable tools
- sysADM
- Linux X Windows
- RED X BLUE security
https://news.1rj.ru/str/joinchat/HSfwBUe_xM6NuC5FCjKVWQ🦠 @Phantasm_Lab
First look at a simple PoC crash - Exploiting FFmpeg ft. Paul Cher
https://www.youtube.com/watch?v=drPyKgt1MMg
🦠 @Phantasm_Lab
This is the first part of exploiting ffmpeg. A huge thank you to Paul Cher for the excellent work on recording the process and sharing his research. I merely edited it together.https://www.youtube.com/watch?v=drPyKgt1MMg
🦠 @Phantasm_Lab
YouTube
First look at a simple PoC crash - Exploiting FFmpeg ft. Paul Cher
This is the first part of exploiting ffmpeg. A huge thank you to Paul Cher for the excellent work on recording the process and sharing his research. I merely edited it together.
Vulnerable Version: https://github.com/FFmpeg/FFmpeg/tree/d903b4e3ad4a81b3d…
Vulnerable Version: https://github.com/FFmpeg/FFmpeg/tree/d903b4e3ad4a81b3d…
Analysis of CVE-2016-10190 - Exploiting FFmpeg ft. Paul Cher
https://www.youtube.com/watch?v=Lpt7WIqXOgM
🦠 @Phantasm_Lab
Deeper look at CVE-2016-10190. A Heap overflow caused by a negative HTTP chunksize.https://www.youtube.com/watch?v=Lpt7WIqXOgM
🦠 @Phantasm_Lab
YouTube
Analysis of CVE-2016-10190 - Exploiting FFmpeg ft. Paul Cher
Deeper look at CVE-2016-10190. A Heap overflow caused by a negative HTTP chunksize.
Vulnerable Version: https://github.com/FFmpeg/FFmpeg/tree/d903b4e3ad4a81b3dd79f12c2f3b9cb16e511173
Paul on Twitter: https://twitter.com/__paulch
LiveOverflow Podcast: ht…
Vulnerable Version: https://github.com/FFmpeg/FFmpeg/tree/d903b4e3ad4a81b3dd79f12c2f3b9cb16e511173
Paul on Twitter: https://twitter.com/__paulch
LiveOverflow Podcast: ht…
RTMP Heap Overflow CVE-2016-10191 - Exploiting FFmpeg ft. Paul Cher
https://www.youtube.com/watch?v=hRei9xXRAGE
🦠 @Phantasm_Lab
Paul shows us another exploit for FFmpeg. The vulnerability is located in the RTMP protocol. While working with the binary format of the protocol requires a lot of work, the exploit itself is very easy.https://www.youtube.com/watch?v=hRei9xXRAGE
🦠 @Phantasm_Lab
YouTube
RTMP Heap Overflow CVE-2016-10191 - Exploiting FFmpeg ft. Paul Cher
Paul shows us another exploit for FFmpeg. The vulnerability is located in the RTMP protocol. While working with the binary format of the protocol requires a lot of work, the exploit itself is very easy.
Vulnerable Version: https://github.com/FFmpeg/FFmp…
Vulnerable Version: https://github.com/FFmpeg/FFmp…
SEC599 - Defeat Advanced Adversaries
https://drive.google.com/open?id=1f143KWI1QasJuM19qnXeQwRQshsvetFO
📟 @Phantasm_Lab
📟 @p4riza
https://drive.google.com/open?id=1f143KWI1QasJuM19qnXeQwRQshsvetFO
📟 @Phantasm_Lab
📟 @p4riza
URL Bar Spoofin g Flaw in Safari for iOS 12.3 and iOS 13 Beta | CVE-2019-8727
https://medium.com/bugbountywriteup/url-bar-spoofing-in-safari-for-ios-12-3-and-ios-13-beta-cve-2019-8727-d87490f8ee29
📬 @Phantasm_Lab
https://medium.com/bugbountywriteup/url-bar-spoofing-in-safari-for-ios-12-3-and-ios-13-beta-cve-2019-8727-d87490f8ee29
📬 @Phantasm_Lab
Medium
URL Bar Spoofing in Safari for iOS 12.3 and iOS 13 Beta | CVE-2019–8727
While working for browser-based attacks on the URL bar, I learned a way where it was still possible to spoof address bar in safari. None…
How two dead accounts allowed REMOTE CRASH of any Instagram android user
https://medium.com/bugbountywriteup/how-two-dead-users-allowed-remote-crash-of-any-instagram-android-user-8f20e88b1b59
📬 @Phantasm_Lab
https://medium.com/bugbountywriteup/how-two-dead-users-allowed-remote-crash-of-any-instagram-android-user-8f20e88b1b59
📬 @Phantasm_Lab
Medium
How two dead accounts allowed REMOTE CRASH of any Instagram android user
Facebook bug bounty remote crash bug
How I was able to bypass OTP code requirement in Razer [The story of a critical bug]
https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572
https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572
Medium
How I was able to bypass OTP code requirement in Razer [The story of a critical bug]
A story of turning an Informative bug to critical bug
4 Methods to Bypass two factor Authentication - Shahmeer Amir
https://shahmeeramir.com/4-methods-to-bypass-two-factor-authentication-2b0075d9eb5f
https://shahmeeramir.com/4-methods-to-bypass-two-factor-authentication-2b0075d9eb5f
Medium
4 Methods to Bypass two factor Authentication
Since the dawn of the World Wide Web, attackers have been involved in discovering techniques to compromise systems. Likewise security…
