[CVE-2017-18345] Joomla Joomanager 2.0.0 Joomanager Arbitrary File Download Exploit
Collecting databases in mass with plugin : COM_JOOMANAGER, From CMS: Joomla, Project developed in python 2.x, more information, access the youtube video.
https://youtu.be/CIvDzwxaZxM
Collecting databases in mass with plugin : COM_JOOMANAGER, From CMS: Joomla, Project developed in python 2.x, more information, access the youtube video.
https://youtu.be/CIvDzwxaZxM
Forwarded from @Phantasm_Lab ([L]uth1er)
Bypassing Web Application Firewall Part 1
https://medium.com/@iratoon/bypassing-web-application-firewall-part-1-3cfd7a1b1159
Bypassing Web Application Firewall Part 2
https://medium.com/@iratoon/bypassing-web-application-firewall-part-2-269470e0c40b
Bypassing Web Application Firewall Part 3
https://medium.com/@iratoon/bypassing-web-application-firewall-part-3-521fd66a6422
Bypassing Web Application Firewall Part 4
https://medium.com/@iratoon/bypassing-web-application-firewall-part-4-862e9929e350
https://medium.com/@iratoon/bypassing-web-application-firewall-part-1-3cfd7a1b1159
Bypassing Web Application Firewall Part 2
https://medium.com/@iratoon/bypassing-web-application-firewall-part-2-269470e0c40b
Bypassing Web Application Firewall Part 3
https://medium.com/@iratoon/bypassing-web-application-firewall-part-3-521fd66a6422
Bypassing Web Application Firewall Part 4
https://medium.com/@iratoon/bypassing-web-application-firewall-part-4-862e9929e350
Medium
Bypassing Web Application Firewall Part — 1
As many of you may know, a Web Application Firewall is a firewall that sits in front of our web applications, and filters, analyzes and…
MY BUG BOUNTY JOURNEY!
I'm a bug bounty hunter who's learning everyday and sharing useful resources as I move along.
https://youtu.be/ug7FzoByLFc
I'm a bug bounty hunter who's learning everyday and sharing useful resources as I move along.
https://youtu.be/ug7FzoByLFc
YouTube
MY BUG BOUNTY JOURNEY!
I'm a bug bounty hunter who's learning everyday and sharing useful resources as I move along. Subscribe to my channel because I'll be sharing my knowledge in new videos regularly.
BUY ME A COFFEE:
https://www.buymeacoffee.com/farahhawa
SOCIAL MEDIA:
Connect…
BUY ME A COFFEE:
https://www.buymeacoffee.com/farahhawa
SOCIAL MEDIA:
Connect…
How to Crush Bug Bounties in the first 12 Months
This talk is perfect for anyone who has just started, or is about to start bug bounties. More seasoned hackers will also glean some tips to improve their workflow. I'll lay out a roadmap for a new bug bounty hunter that can be applied to boost their knowledge and success in their first 12 months. Join @hakluke in todays awesome bug bounty for beginners talk!
https://youtu.be/AbebbJ3cRLI
This talk is perfect for anyone who has just started, or is about to start bug bounties. More seasoned hackers will also glean some tips to improve their workflow. I'll lay out a roadmap for a new bug bounty hunter that can be applied to boost their knowledge and success in their first 12 months. Join @hakluke in todays awesome bug bounty for beginners talk!
https://youtu.be/AbebbJ3cRLI
YouTube
How to Crush Bug Bounties in the first 12 Months
This talk is perfect for anyone who has just started, or is about to start bug bounties. More seasoned hackers will also glean some tips to improve their workflow. I'll lay out a roadmap for a new bug bounty hunter that can be applied to boost their knowledge…
Forwarded from @Phantasm_Lab
hacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 Chapters
🧬 @Phantasm_Lab
One day in May 2017, computers all around the world suddenly shut down.
A malware called WannaCry asks for a ransom. The epidemic suddenly stops,
because a young, British researcher finds a killswitch, by accident.
https://youtu.be/vveLaA-z3-o🧬 @Phantasm_Lab
YouTube
hacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 Chapters
One day in May 2017, computers all around the world suddenly shut down. A malware called WannaCry asks for a ransom. The epidemic suddenly stops, because a young, British researcher finds a killswitch, by accident.
An exclusive Tomorrow Unlocked documentary.…
An exclusive Tomorrow Unlocked documentary.…
CNN - Series Originals: A Republica Hackeada
Exclusivo: Lava Jato queria prender Gilmar Mendes e Toffoli, diz hacker à CNN
https://youtu.be/edjznNDHf74
Exclusivo: Lava Jato queria prender Gilmar Mendes e Toffoli, diz hacker à CNN
https://youtu.be/edjznNDHf74
YouTube
Exclusivo: Lava Jato queria prender Gilmar Mendes e Toffoli, diz hacker à CNN
O hacker Walter Delgatti Neto afirmou, em entrevista exclusiva ao CNN Séries Originais, que a Operação Lava Jato tinha por objetivo prender os ministros do Supremo Tribunal Federal Dias Toffoli e Gilmar Mendes. #CNNBrasil
Inscreva-se no canal da CNN Brasil…
Inscreva-se no canal da CNN Brasil…
Introduction to AWS Services
This video gives the complete overview of various AWS services by designing a sample Application. Ideal for those who are new to AWS and those who want to understand where particular AWS service fits into a sample application architecture
https://youtu.be/Z3SYDTMP3ME
This video gives the complete overview of various AWS services by designing a sample Application. Ideal for those who are new to AWS and those who want to understand where particular AWS service fits into a sample application architecture
https://youtu.be/Z3SYDTMP3ME
YouTube
Introduction to AWS Services
[2024 version has been released - please check here on this channel]
This video is part of my AWS Cerfified Cloud Practitioner course on Udemy: https://www.udemy.com/course/aws-certified-cloud-practitioner-clf-c02-latest/?referralCode=E4E802AB0D47D58AC70A…
This video is part of my AWS Cerfified Cloud Practitioner course on Udemy: https://www.udemy.com/course/aws-certified-cloud-practitioner-clf-c02-latest/?referralCode=E4E802AB0D47D58AC70A…
The Most Important AWS Services That You NEED To Learn!
If you're looking to understand the wide variety of AWS services, this is the video for you. In this video, I explain to you the core AWS services through an easy to follow example. We explore services such as Amazon S3, AWS Lambda, Amazon RDS, DynamoDB, and many more!
https://youtu.be/B08iQQhXG1Y
If you're looking to understand the wide variety of AWS services, this is the video for you. In this video, I explain to you the core AWS services through an easy to follow example. We explore services such as Amazon S3, AWS Lambda, Amazon RDS, DynamoDB, and many more!
https://youtu.be/B08iQQhXG1Y
YouTube
The Most Important AWS Core Services That You NEED To Know About!
If you're looking to understand the wide variety of AWS services, this is the video for you. In this video, I explain to you the core AWS services through an easy to follow example. We explore services such as Amazon S3, AWS Lambda, Amazon RDS, DynamoDB,…
[Exploit] - Impropper Access Control - Arbitrary File Download + IDOR (0day Vulnerability) MEC
I found a IDOR Lead to Arbitrary File Download in a subdomain of the mec.gov.br, with this vulnerability we can generate random id and request to the server to discovery sensitive files, with this vulnerability it's possible to access, bidding for works,PDF Files sent via emails, information about City's of the country.
https://youtu.be/yOzoIGJJqvk
I found a IDOR Lead to Arbitrary File Download in a subdomain of the mec.gov.br, with this vulnerability we can generate random id and request to the server to discovery sensitive files, with this vulnerability it's possible to access, bidding for works,PDF Files sent via emails, information about City's of the country.
https://youtu.be/yOzoIGJJqvk
Forwarded from SHELL SHOCK
https://www.udemy.com/course/digital-forensics-zero-to-hero-computer-forensics/?couponCode=FORENSICS
Udemy
Online Courses - Learn Anything, On Your Schedule | Udemy
Udemy is an online learning and teaching marketplace with over 250,000 courses and 73 million students. Learn programming, marketing, data science and more.
CYBER SECURITY KILL CHAIN / LIFE CYCLE
A Cyber Security Kill Chain framework is developed by Lockheed Martin which applies to Cyber Security and is part of the Intelligence Driven Defense model for identification and prevention of cyber intrusions activity.
https://hacklido.com/blog/30-cyber-security-kill-chain-life-cycle
A Cyber Security Kill Chain framework is developed by Lockheed Martin which applies to Cyber Security and is part of the Intelligence Driven Defense model for identification and prevention of cyber intrusions activity.
https://hacklido.com/blog/30-cyber-security-kill-chain-life-cycle
Router Firmware Hacking - Extraction
This video outlines various ways routers compress their firmware. Firmware will have all the files needed for the routers operating system and applications. Things such as a web server so a user can interact with the router and telnet to connect to the router to give commands. Analysing routers gives an insight into potential vulnerabilities held by router firmware.
https://youtu.be/tmnvJe-TkJQ
This video outlines various ways routers compress their firmware. Firmware will have all the files needed for the routers operating system and applications. Things such as a web server so a user can interact with the router and telnet to connect to the router to give commands. Analysing routers gives an insight into potential vulnerabilities held by router firmware.
https://youtu.be/tmnvJe-TkJQ
YouTube
Router Firmware Hacking - Extraction
This video outlines various ways routers compress their firmware. Firmware will have all the files needed for the routers operating system and applications. Things such as a web server so a user can interact with the router and telnet to connect to the router…
Simple Firmware Reverse Engineering
Getting access to and examining firmware is easier than you think and it gives some really good insight into how things work. It's never been easier to get started.
https://youtu.be/oqk3cU7ekag
Getting access to and examining firmware is easier than you think and it gives some really good insight into how things work. It's never been easier to get started.
https://youtu.be/oqk3cU7ekag
YouTube
Simple Firmware Reverse Engineering
Getting access to and examining firmware is easier than you think and it gives some really good insight into how things work. It's never been easier to get started.
Hope you enjoyed the video!
Join my Discord server to chat with me:
https://discord.gg/engineerman…
Hope you enjoyed the video!
Join my Discord server to chat with me:
https://discord.gg/engineerman…
Introduction to Firmware Reversing
To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out
https://youtu.be/GIU4yJn2-2A
To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out
https://youtu.be/GIU4yJn2-2A
YouTube
Introduction to Firmware Reversing
To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out
http://1585security.com/Firmware-Reversing…
http://1585security.com/Firmware-Reversing…