20/09/2024
A Journey From sudo iptables
To Local Privilege Escalation
In this post, we demonstrate two techniques allowing a low privileged user to escalate their privileges to root in case they can run iptables and/or iptables-save as
Min
By smaury
29/03/2024
Bref Security Audit, sponsored by Amazon Web Services (AWS), facilitated by Open Source Technology Improvement Fund (OSTIF) and performed by Shielder.
Min
05/09/2022
How to Decrypt Manage Engine PMP Passwords for Fun and Domain Admin - a Red Teaming Tale
Learn how to decrypt Manage Engine Password Manager Pro (PMP) passwords after exploiting CVE-2022-35405.
Min
By smaury
27/04/2020
Keybase client allowed inject arbitrary links with arbitrary protocols. This caused a Remote Command Execution on Windows and MacOS.
Min
By smaury
13/04/2019
Exploiting Apache Solr through OpenCMS
Exploiting a known XXE in Apache Solr through OpenCMS handleSolrSelect, to read arbitrary files from the OpenCMS' server.
Min
By smaury
31/05/2017
SOLUZIONE Seeweb Hacking Contest 2017: Music Of The Atoms
Soluzione del CTF Hacking Contest 2017: Music Of The Atoms di Seeweb. Scopri come risolvere tutte le challenge del #SeewebContest
Min
By smaury
02/04/2017
SOLUZIONE HiB CTF 2017 Spring Edition
Soluzione del CTF di HackInBo 2017 Spring Edition 2017. Scopri come risolvere tutte le challenge!
Min
By smaury
20/04/2016
Dimostra la tue abilità da hacker per completare la CTF di Shielder e vincere fantastici premi dal 22 Aprile 2016 13:37 GMT al 06 Maggio 2016 13:37 GMT.
Min
By smaury
18/06/2015
Analisi Documento Word con Macro malevole
Come funziona un Trojan: analisi di un Documento di Word contenente Macro Malevole.
Min
By smaury
13/05/2015
Meglio insicuri che erroneamente protetti
Come un sistema di protezione mal progettato può diventare un ottimo vettore d'attacco.
Min