|
You are here |
blog.ikuamike.io | ||
| | | | |
rot256.dev
|
|
| | | | | The Bluesound POWERNODE is a "Wireless Stereo Component", which allows the user to stream to an older analogue sound system. It also includes an amp. I (sadly) happen to have such a device at home and decided to take a look at the firmware. The results were as expected. Most of the product line appears to be vulnerable, since they run mostly the same software. I would also be surprised if this is the only vulnerability in the device. | |
| | | | |
gtfobins.github.io
|
|
| | | | | [AI summary] The text explains various methods to exploit Perl scripts for privilege escalation and maintaining access in restricted environments through techniques like reverse shells, SUID binaries, and capability manipulation. | |
| | | | |
pentestmonkey.net
|
|
| | | | | [AI summary] This article provides a cheat sheet for creating reverse shells in various scripting languages during penetration testing. | |
| | | | |
kyrofa.com
|
|
| | | Keep your test VMs as close to the real thing as possible | ||