From 0 to pentesting hero
Today we are going to search for some vulnerabilitis in the code responsible for XML parsing.
2 MIN READ
From 0 to pentesting hero
Today we are going to search for some vulnerabilitis in the code responsible for XML parsing.
2 MIN READ
From 0 to pentesting hero
Today we are going to talk about Ruby language. We'll take a look at a simple implementation of the proxy server.
2 MIN READ
From 0 to pentesting hero
Today's example consists of 2 lines of python code, because usually it's enough to introduce a vulnerability to our application.
2 MIN READ
Vulnerabilities
This vulnerability allows a normal user to modify the permissions of repositories that he normally shouldn’t have access to.
2 MIN READ
Vulnerabilities
This is part 1 of 3 about bugs inside Gitea
5 MIN READ
Vulnerabilities
How to create a Metasploit module in example?
1 MIN READ
Vulnerabilities
GitBucket Unauthenticated Remote Code Execution working when server is installed on Windows and authenticated arbitrary file read working on every platform
4 MIN READ
Vulnerabilities
I create this simple cheat sheet because of GitList 0.6 Unauthenticated RCE so you can easily understand how it works.
5 MIN READ
From 0 to pentesting hero
This time, unusually - we are not going to look at a specific programming language but a Linux function - unzip - that is for extracting files.
29-01-2019
2 MIN READ