You are here |
damienbod.com | ||
| | | |
dylanbeattie.net
|
|
| | | | Using ASP.NET Core and Azure OpenID Connect to restrict access to admin features based on an authenticated user's email domain. | |
| | | |
dylanbeattie.net
|
|
| | | | Using ASP.NET Core and Azure OpenID Connect to restrict access to admin features based on an authenticated user's email domain. | |
| | | |
az-liftshift.com
|
|
| | | | This article shows how an ASP.NET Core Razor Page application could implement an automatic sign-out when a user does not use the application for n-minutes. The application is secured using Azure AD B2C. To remove the session, the client must sign-out both on the ASP.NET Core application and the Azure AD B2C identity provider or | |
| | | |
blog.ikuamike.io
|
|
| | Difficulty Release Date Author Intermediate 18 July 2019 Zayotic Summary This box had quite a good number of misconfigurations and vulnerabilities. Initial access was through copying a shadow backup file to a smb share accessible anonymously using a file copy vulnerability in proftpd. Then lateral movement and privilege escalation was achieved by exploiting rce a locally running librenms instance and finally abusing sudo permissions on mysql to get root. |