Explore >> Select a destination


You are here

blog.google
| | business.safety.google
6.6 parsecs away

Travel
| | When we create security solutions to keep our business services safer, we find opportunities to share it for everyones benefit.
| | eprint.iacr.org
44.9 parsecs away

Travel
| | In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages to individuals and corporations. In this work, we analyze these attacks, and find they often exploit usability failures of browsers. We developed and describe TrustBar, a browser extension for improved secure identification indicators. Users can assign a name/logo to a secure site, presented by TrustBar when the browser present...
| | 2019.www.torproject.org
33.8 parsecs away

Travel
| |
| | blog.ikuamike.io
103.3 parsecs away

Travel
| Difficulty Release Date Author Intermediate 20 Aug 2019 Zayotic Summary For this box, some directory bruteforce is needed to discover some php files. One of the php files has an lfi vulnerability but can only be access by authenticating to the other page. The login form can be bypassed and we exploit the lfi. For that we poison ssh logs for exploitation to rce. For privilege escalation we exploit a python web app running locally as root using insecure deserialization of the cookie by jsonpickle.