Explore >> Select a destination


You are here

0xboku.com
| | thatsn0tmy.site
3.8 parsecs away

Travel
| | Hi folks! I recently read about a few vulnerabilities on Terramaster which were basically stolen from me heavily inspired by my previous ones, so I decided to look into Terramaster again, just to find a few more. Ah. This time I didn't spend much time reasearching, and I couldn't find an auth bypass so you will need valid credentials to reach the RCEs. Don't worry tho, you ransomware operators can still get the admin hashes and username. Some assembly hashcat required.
| | highon.coffee
5.1 parsecs away

Travel
| | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI
| | taeluralexis.com
3.5 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | www.welivesecurity.com
27.3 parsecs away

Travel
| In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server.