|
You are here |
0xboku.com | ||
| | | | |
thatsn0tmy.site
|
|
| | | | | Hi folks! I recently read about a few vulnerabilities on Terramaster which were basically stolen from me heavily inspired by my previous ones, so I decided to look into Terramaster again, just to find a few more. Ah. This time I didn't spend much time reasearching, and I couldn't find an auth bypass so you will need valid credentials to reach the RCEs. Don't worry tho, you ransomware operators can still get the admin hashes and username. Some assembly hashcat required. | |
| | | | |
highon.coffee
|
|
| | | | | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
www.welivesecurity.com
|
|
| | | In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server. | ||