All Activity
- Today
-
EmilyDavis joined the community
-
PayPal joined the community
- Yesterday
-
DEEZSNUTS11 joined the community
-
Mimo26 joined the community
-
aryan11 joined the community
-
foxshift joined the community
-
hotmail 9697 Lines Fresh Hotmail Combolist
stormtrooper222 posted a topic in Proxy Lists & Wordlists
[Hidden Content] Telegram Channel: @databasefromstorm My telegram: @BrowzData -
Palo Alto OS was recently hit by a command injection zero day attack. These are exploitation details related to the zero day.View the full article
-
pgAdmin versions 8.3 and below have a path traversal vulnerability within their session management logic that can allow a pickled file to be loaded from an arbitrary location. This can be used to load a malicious, serialized Python object to execute code within the context of the target application. This exploit supports two techniques by which the payload can be loaded, depending on whether or not credentials are specified. If valid credentials are provided, Metasploit will login to pgAdmin and upload a payload object using pgAdmin's file management plugin. Once uploaded, this payload is executed via the path traversal before being deleted using the file management plugin. This technique works for both Linux and Windows targets. If no credentials are provided, Metasploit will start an SMB server and attempt to trigger loading the payload via a UNC path. This technique only works for Windows targets. For Windows 10 v1709 (Redstone 3) and later, it also requires that insecure outbound guest access be enabled. Tested on pgAdmin 8.3 on Linux, 7.7 on Linux, 7.0 on Linux, and 8.3 on Windows. The file management plugin underwent changes in the 6.x versions and therefore, pgAdmin versions below 7.0 cannot utilize the authenticated technique whereby a payload is uploaded.View the full article
-
moviesmob joined the community
-
Voltereta joined the community
-
doktornarkoz joined the community
-
NoArgs: Manipulating and Hiding Process Arguments
sdsvsdv replied to dEEpEst's topic in Hacking Tools
Does such an instrument get very hot with different AV or EDR? -
zdbnd joined the community
- Last week
-
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly. Technical Implementation Injection into Command Prompt (cmd): The tool injects its code into the Command Prompt process, embedding it as Position Independent Code (PIC). This enables seamless integration into cmd's memory space, ensuring covert operation without reliance on specific memory addresses. (Only for The Obfuscated Executable in the releases page) Windows API Hooking: Detours are utilized to intercept calls to the CreateProcessW function. By redirecting the execution flow to a custom implementation, the tool can execute its logic before the original Windows API function. Custom Process Creation Function: Upon intercepting a CreateProcessW call, the custom function is executed, creating the new process and manipulating its arguments as necessary. PEB Modification: Within the custom process creation function, the Process Environment Block (PEB) of the newly created process is accessed and modified to achieve the goal of manipulating or hiding the process arguments. Execution Redirection: Upon completion of the manipulations, the execution seamlessly returns to Command Prompt (cmd) without any interruptions. This dynamic redirection ensures that subsequent commands entered undergo manipulation discreetly, evading detection and logging mechanisms that relay on getting the process details from the PEB. Installation and Usagre [hide][Hidden Content]]
- 1 reply
-
- 2
-
zareen started following 1x Rapidgator
-
[Hidden Content] Telegram Channel: @databasefromstorm My telegram: @BrowzData
-
Centreon version 23.10-1.el8 suffers from a remote authenticated SQL injection vulnerability.View the full article
-
goofy123 started following [SILVERBULLET] HBO MAX Config + Capture
-
alexblux changed their profile photo
-
alexblux started following IDA Pro 8.3 (+SDK Tools) Cracked by Team BGSPA {Keygen Included}
-
The password of database connections in AWS Glue is loaded into the website when a connection's edit page is requested. Principals with appropriate permissions can read the password. This behavior also increases the risk that database passwords will be intercepted by an attacker during transmission in the server response. Many types of vulnerabilities, such as broken access controls, cross site scripting and weaknesses in session handling, could enable an attacker to leverage this behavior to retrieve the passwords.View the full article
-
This Metasploit exploit module leverages an improperly controlled modification of dynamically-determined object attributes vulnerability (CVE-2023-43177) to achieve unauthenticated remote code execution. This affects CrushFTP versions prior to 10.5.1. It is possible to set some user's session properties by sending an HTTP request with specially crafted Header key-value pairs. This enables an unauthenticated attacker to access files anywhere on the server file system and steal the session cookies of valid authenticated users. The attack consists in hijacking a user's session and escalates privileges to obtain full control of the target. Remote code execution is obtained by abusing the dynamic SQL driver loading and configuration testing feature.View the full article
-
GLPI versions 10.x.x suffers from a remote command execution vulnerability via the shell commands plugin.View the full article
-
Kruxton version 1.0 suffers from a remote SQL injection vulnerability.View the full article
-
Kruxton version 1.0 suffers from a remote shell upload vulnerability.View the full article
-
WBCE version 1.6.0 suffers from a remote SQL injection vulnerability.View the full article
-
EagleSpy Ultimate V3 Released 2024 | Android RAT [CRACKED]
dan reznik replied to dEEpEst's topic in Trojans
I am facing the same problem if you can share us the password for this file would be appreciated! -
AMPLE BILLS version 0.1 suffers from a remote SQL injection vulnerability.View the full article
-
Moodle version 3.10.1 suffers from a remote time-based SQL injection vulnerability.View the full article