unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
PII Leakage via IDOR + Weak PasswordReset = Full Account Takeover
Hello Hunters, this is a quick write up on one of my recent findings on a bug bounty program. Before...
2020-09-26 05:02:31 | 阅读: 198 |
收藏
|
medium.com
forgot
pii
username
How I earned $500 from Google - Flaw in Authentication
This is my first writeup.Today I will share the write-up of my first accepted bug in Google, Which i...
2020-09-26 04:12:39 | 阅读: 178 |
收藏
|
medium.com
victim
hemant
entered
security
聊聊glibc 2.32 malloc新增的保護機制-Safe Linking
Check Point的研究員@Eyal Itkin在今年向glibc提交了一個commit-其中針對malloc中的single-linked list結構(fastbin / tcache)設計了...
2020-07-22 18:33:19 | 阅读: 19 |
收藏
|
medium.com
攻擊
檢查
tps
攻擊者
fastbin
If you see the step after subdomain resolving, I have mentioned that navigating to that particular…
Harsh BothraJul 2 · 1 min readIf you see the step after subdomain resolving, I have mentioned that n...
2020-07-03 04:29:48 | 阅读: 156 |
收藏
|
medium.com
harsh
bothrajul
bucketname
mentions
doubts
S3 Bucket Misconfigured Access Controls to Critical Vulnerability
Amazon S3 (Simple Storage Service) is one of the popular and widely used storage services. Many comp...
2020-07-02 18:53:45 | 阅读: 141 |
收藏
|
medium.com
buckets
attacker
subtarget
subdomain
Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks
2020-6-29 23:55:23 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
Well. Exact reason is still a mystry to me as well !
Well. Exact reason is still a mystry to me as well ! Initially when I was testing I was not able to...
2020-06-20 01:25:26 | 阅读: 148 |
收藏
|
medium.com
lucky
happily
limiting
captcha
recaptcha
This does impact “Confidentiality” of the system running the vulnerable software.
Harsh BothraJun 18 · 1 min readThis does impact the “Confidentiality” of the system running the vuln...
2020-06-18 19:43:01 | 阅读: 135 |
收藏
|
medium.com
readthis
harvested
utilized
harsh
Yes. There was no Server Side Validation. All you require is:
Yes. There was no Server Side Validation. All you require is:Provide an email :
[email protected]
...
2020-06-17 11:48:26 | 阅读: 153 |
收藏
|
medium.com
occasional
teamer
synack
bugcrowd
stories
The application misses server-side checks allowing me to bypass the requirement of providing…
Harsh BothraJun 16 · 1 min readThe application misses server-side checks allowing me to bypass the r...
2020-06-16 11:16:52 | 阅读: 147 |
收藏
|
medium.com
mistakes
restriction
bypass
bothrajun
Red Team: How to embed Golang tools in C# - Shantanu Khandelwal - Medium
Last night I was working on some private tools. The story began when I presented a tool to my mentor...
2020-06-13 16:48:22 | 阅读: 510 |
收藏
|
medium.com
stringtest
printhello
nugets
dllimport
entrypoint
How to run Mimikatz on SharpHellsGate - Mark Mo - Medium
I learned a few things and had to trouble shoot a few things so I thought this might be helpful to s...
2020-06-13 16:46:28 | 阅读: 622 |
收藏
|
medium.com
mimikatz
shellcode
payload
am0nsec
hellsgate
Let’s Bypass CSRF Protection & Password Confirmation to Takeover Victim Accounts :D
Anti-CSRF Tokens are a way that allows the server to uniquely distinguish who actually requests the...
2020-06-13 01:43:20 | 阅读: 149 |
收藏
|
medium.com
bypass
1host
forged
victim
editprofile
XSS to Database Credential Leakage & Database Access — Story of total luck!
Reflected Cross-Site Scripting happens when you provide a malicious javascript code to some input pa...
2020-06-06 21:47:06 | 阅读: 131 |
收藏
|
medium.com
database
lucky
luck
malicious
wordpress
Found Stored Cross-Site Scripting — What’s Next? — Privilege Escalation like a Boss :D
Cross-site scripting is one of the prominent attacks of all time. It is still being exploited in the...
2020-05-20 01:17:37 | 阅读: 128 |
收藏
|
medium.com
attacker
hanging
exploited
remote
hijacking
The “+” here is used to create an alias.
The “+” here is used to create an alias. For example, If your email id is
[email protected]
— ex...
2020-05-19 14:50:17 | 阅读: 146 |
收藏
|
medium.com
example0516
synack
harshbothra
poet
bugcrowd
Secure Sublinear Time Differentially Private Median Computation
2020-5-7 23:55:20 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
Secure Computation of the k-th Ranked Element in a Star Network
2020-4-19 23:7:26 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
Lessons Learned from SunDEW: A Self Defense Environment for Web Applications
2020-3-20 02:19:27 | 阅读: 0 |
收藏
|
Stories by SAP Security Research on Medium - medium.com
XXE on Windows system …then what ?? - Hamada - Medium
Assignment :During a pentest, i was auditing a web application which hosting documents and files in...
2020-02-17 17:47:15 | 阅读: 632 |
收藏
|
medium.com
payload
windows
friend
microsoft
b00m
Previous
9
10
11
12
13
14
15
16
Next