|
You are here |
www.elttam.com | ||
| | | | |
blog.pkh.me
|
|
| | | | | It's been a very long time since I've done some actual reverse engineering work. Going through a difficult period currently, I needed to take a break from the graphics world and go back to the roots: understanding obscure or elementary tech stuff. One may argue that it was most certainly not the best way to deal with a burnout, but apparently that was what I needed at that moment. Put on your black hoodie and follow me, it's gonna be fun. The beginning and the start of the end So I started solving a few ... | |
| | | | |
www.modzero.ch
|
|
| | | | | [AI summary] This advisory details critical vulnerabilities in Cisco IP phones' web interfaces that allow remote attackers to gain full control of the devices without authentication. The vulnerabilities include buffer overflow, path traversal, and CSRF weaknesses, which can be exploited to install backdoors, exfiltrate data, and use the phones as attack vectors. | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
cocomelonc.github.io
|
|
| | | [AI summary] A technical deep dive into an early bird APC injection technique, complete with source code and payload execution examples, intended for both offensive and defensive cybersecurity education. | ||