Bypass SSRF filters using domain redirection and abusing Python PDB
Oct 15, 2022
·
9 min readIntelligence brings some cool enumeration and exploitation techniques to own Active Directory. It …
Sep 19, 2022
·
12 min readDynstr imitates a company that offers a Dynamic DNS service. The provided API for this service is …
Oct 18, 2021
·
12 min readAs a medium difficulty box, Pit from Hack The Box has an interesting enumeration flow. It starts by …
Oct 13, 2021
·
15 min readMoodle exploitation using CVEs
Sep 16, 2021
·
11 min readSSTI in Golang, abuse S3 bucket, and NGINX backdoor
Sep 12, 2021
·
15 min readDeserialization attack on YAML and reversing web assembly
Aug 06, 2021
·
9 min readFriendly PHP insecure deserialization attack and race condition
Jun 14, 2021
·
11 min readTurns SSRF to remote code execution and escape from a Docker container
May 15, 2021
·
9 min readExploiting an insecure deserialization on Jackson library and how to mitigate it
May 09, 2021
·
9 min readUSBCreator LPE on Linux
May 07, 2021
·
9 min readLearn how Azure Pipelines can be abused
May 03, 2021
·
12 min readExample of a phishing attack and PyPI package exploitation
Apr 28, 2021
·
10 min readAbusing Tomcat manager-script roles and escalate to root with LXC container
Apr 26, 2021
·
7 min readPentesting against simulated AWS S3 Bucket
Apr 24, 2021
·
14 min readPlundering dead Active Directory accounts
Apr 23, 2021
·
11 min readSQLi for login bypass and embed webshell to an image file
Apr 09, 2021
·
6 min read