|
You are here |
johnjhacking.com | ||
| | | | |
taeluralexis.com
|
|
| | | | | In this writeup, we'll exploit a Linux machine on Hack The Box with CVE-2023-46604, leveraging Java deserialization for remote code execution. | |
| | | | |
blog.aghanim.net
|
|
| | | | | [AI summary] A collection of notes and resources related to cybersecurity topics such as penetration testing, malware analysis, AV evasion, and ethical hacking, compiled by an individual working on various security-related projects and courses. | |
| | | | |
www.lampysecurity.com
|
|
| | | | | So I finally did it. After almost three years of studying on and off, a complete exam change, and a wedding, I finally passed the OSCP. The OSCP was a long-term goal for me. While I already had a job as a Penetration Tester, I wanted to pass the OSCP as it is regularly a "desired" skill for many job listings. There are some excellent concepts to learn while taking it, which will be useful during testing in the real world.Preparation:In March, I got the wonderful opportunity from work to purchase | |
| | | | |
machevalia.blog
|
|
| | | [AI summary] The article details a remote code execution vulnerability in a .tgz file upload feature, where the server's parsing logic allowed an attacker to bypass filters by crafting a malicious archive with a web shell. | ||