|
You are here |
highon.coffee | ||
| | | | |
blog.ikuamike.io
|
|
| | | | | Difficulty Release Date Author Beginner 2 Mar 2020 Zayotic Summary In this box, we first perform ldap injection on the web application to bypass the login page. Then we are able to read local files by abusing a local file inclusion vulnerability with php base64 filter. From one of the php files we get ldap credentials that we used to authenticate to ldap and dump entries. From the entries we get a base64 encoded password that we could use to ssh into the machine. | |
| | | | |
0xcybery.github.io
|
|
| | | | | Bypass IPS in Check Point Firewall | |
| | | | |
eapolsniper.github.io
|
|
| | | | | [AI summary] The blog post discusses a critical security vulnerability in Splunk Universal Forwarders, allowing attackers to exploit weak passwords and API access to gain SYSTEM or root privileges on networked systems. | |
| | | | |
www.p1sec.com
|
|
| | | Learn about GSMA FS.31 Baseline Security guidelines for mobile networks. Discover how P1 Security's solutions can help secure your network and protect it from evolving cybersecurity threats. | ||