|
You are here |
blog.ikuamike.io | ||
| | | | |
gtfobins.github.io
|
|
| | | | | [AI summary] The text explains various methods to exploit Perl scripts for privilege escalation and maintaining access in restricted environments through techniques like reverse shells, SUID binaries, and capability manipulation. | |
| | | | |
taeluralexis.com
|
|
| | | | | In this writeup, we'll exploit a Linux machine on Hack The Box with CVE-2023-46604, leveraging Java deserialization for remote code execution. | |
| | | | |
rot256.dev
|
|
| | | | | The Bluesound POWERNODE is a "Wireless Stereo Component", which allows the user to stream to an older analogue sound system. It also includes an amp. I (sadly) happen to have such a device at home and decided to take a look at the firmware. The results were as expected. Most of the product line appears to be vulnerable, since they run mostly the same software. I would also be surprised if this is the only vulnerability in the device. | |
| | | | |
blog.adnansiddiqi.me
|
|
| | | Image Source What Is Application Security? Application security is the practice of protecting computer systems and applications from threats and vulnerabilities. This includes measures to prevent unauthorized access, modification, use, destruction, disruption, or disclosure of an application or its data Application security is important because applications are often the primary targets of cyber attacks. Hackers | ||