This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3❤1
Please open Telegram to view this post
VIEW IN TELEGRAM
👏3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍7
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6❤🔥1🔥1👏1😁1
This media is not supported in your browser
VIEW IN TELEGRAM
✅PoC: https://github.com/bigb0x/CVE-2024-36991
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
🛠️Guide to Active Directory Hacking
📝Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.
📰 Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/
🔖#infosec #cybersecurity #hacking #pentesting #security
📝Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.
📰 Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/
🔖#infosec #cybersecurity #hacking #pentesting #security
CVE-2024-39929: Bypass of attachment verification in Exim❗
Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.
Search at Netlas.io:
👉 Link: https://nt.ls/gRdtH
👉 Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"
Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.
Search at Netlas.io:
👉 Link: https://nt.ls/gRdtH
👉 Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"
Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
Brut Security pinned «📣 Understanding Bug Bounty Hunting for Newcomers📣 🎁 Bug bounty hunting can seem appealing, but it’s important to know: 🖱 High Skill Level Required: Success in bug bounty hunting demands a very high skill level. It's not just about using tools like Nuclei to…»
http://1337/login.do?jvar_page_noscript=<style><j:jelly xmlns:j="jelly" xmlns:g='glide'><g:evaluate>gs.addErrorMessage(7*7);</g:evaluate></j:jelly></style>
🔖#bugbounty #bugbountytips #infosec
Please open Telegram to view this post
VIEW IN TELEGRAM
www.assetnote.io
Chaining Three Bugs to Access All Your ServiceNow Data
Through the course of 3/4 weeks, we were able to find a chain of vulnerabilities that allows full database access and full access to any MID servers configured. This resulted in 3 separate CVE's.
❤1👍1
Please open Telegram to view this post
VIEW IN TELEGRAM
shreyaschavhan on Notion
Year in Bug Bounties - from 0 to $25,700* in 12 months (Stats, Graphs, Learnings, Experiences & Plans!) | Notion
Table of Content:
🔥5👍1
Please open Telegram to view this post
VIEW IN TELEGRAM