Advertisement · 728 × 90

Posts by realansgar (9009)

Preview
Info - Hack.lu CTF 2025 Hack.lu CTF 2025 - Organized by FluxFingers, the CTF team of Ruhr University Bochum

Hack.​lu CTF registration is open! Win great prizes from our sponsors:

🎯 3x @offensivecon.bsky.social tickets by Binary Gecko
🕵️ 6x @burpsuite.bsky.social
🥷 6x @binary.ninja
📦 80 months HackTheBox VIP+
💸 $1000 by Zellic
🇩🇪 DHM quals

flu.xxx

6 months ago 3 2 1 0
Post image

Hej!

We are thrilled to announce Hack.lu CTF 2025 starts on Friday, October 17.

Top teams can win prizes from our sponsors: OffensiveCon, Zellic, PortSwigger, Binary Ninja, and HackTheBox.

All information on flu.xxx

6 months ago 4 3 0 0

Unrelated question: Why does it say NO GLYPH at the end of each line when viewing your post in the Bluesky app? I saw this with multiple of your posts already 🤔

6 months ago 0 0 0 0

Looks like some Linux eBPF vulnerabilities presented at this year's Black Hat are made-up AI slop

www.openwall.com/lists/oss-se...

6 months ago 81 20 4 7

Last weekend, we took 1st place at #idekCTF and qualified for the #MaltaCTF finals!
Congrats to all the other teams, and thanks to the organizers — the CTF was a lot of fun!

8 months ago 3 1 0 0

We secured 3rd place at ENOWARS CTF - top team in the DACH region and now qualified for DHM (German Hacking Championship)!
Huge congrats to all participants and thanks to the organizers for an awesome CTF! 🎉

9 months ago 9 1 0 0

2. should be the issue. I think innerText decides HTML entities, like &lt; to <, which is then assigned to innerHTML.

9 months ago 1 0 1 0
Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (3/3) In the last blog of this series, we will focus back on FortiClient and learn how the inner workings of this application work, and what crucial mistake happened that led to us uncovering a local privil...

🔓⏫ After compromising every endpoint within an organization, our “Caught in the FortiNet” blog series comes to an end with one more thing.
Read more about FortiClient's XPC mistake that allows local privilege escalation to root on macOS:

www.sonarsource.com/blog/caught-...

#appsec #security

9 months ago 3 2 0 0

Looks fine to me. Is there a pitfall with basename()?

11 months ago 0 0 1 0
Advertisement

"this case has been assessed as low severity and does not meet MSRC’s bar for immediate servicing due to RCE is no longer possible without extensive user interaction (i.e., accepting a save prompt to a location controlled by an attacker)"
We love to see it 🫠

11 months ago 2 0 0 0

It's actually free to register with a (burner) email and read the article, you don't have to pay.

11 months ago 0 0 0 0
Preview
The Signal Clone the Trump Admin Uses Was Hacked TeleMessage, a company that makes a modified version of Signal that archives messages for government agencies, was hacked.

well well well
www.404media.co/the-signal-c...

11 months ago 0 0 0 0
Data in Danger: Detecting Cross-Site Scripting in Grafana Learn how SonarQube detected a Cross-Site Scripting (XSS) vulnerability in Grafana, a popular open-source data observability platform.

📊⚠️ Data in danger!

We found an XSS vulnerability in Grafana with the help of SonarQube. Learn about the details in our latest blog post:

www.sonarsource.com/blog/data-in...

#appsec #security #vulnerability

11 months ago 3 2 0 0
Preview
Kiwi Farms - Wikipedia

Ergänzung zur Kiwi 🥝: Es könnte eine Anspielung auf das Kiwi Farms Forum sein, welches hauptsächlich aus extremen, organisierten harassment von trans Personen bestand.
en.m.wikipedia.org/wiki/Kiwi_Fa...

1 year ago 0 0 0 0

And here's the second part of my old JumpServer journey I presented at Insomni'hack24. After getting authenticated last week, this time we're abusing multiple design flaws to get RCE and escape the Docker container on the JumpServer host.

1 year ago 2 0 0 0

Surveillance contractors not choosing overly edgy sounding company names challenge (impossible)

1 year ago 12 0 0 0

Beanies sold out 😫

1 year ago 0 0 0 0
Advertisement

I nominate @sonarresearch.bsky.social, now finally on bluesky :)

1 year ago 2 0 1 0

The Sonar research team just published a blog about my old JumpServer vulns I presented at Insomni'hack24. Check it out for some microservice shenanigans and stay tuned for part two that covers auth->RCE next week.

1 year ago 2 0 0 0
Preview
SAML roulette: the hacker always wins Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.

portswigger.net/research/sam...

1 year ago 53 23 0 4

The call expression check looks at the name of the variable, but not the runtime value of the called function, assuming that it is safe if named calc* We can abuse this to call the function constructor directly and not through calcCall which would block it
calcCall(calcPrint.constructor('alert(1)'))

1 year ago 3 0 0 0

The code tries to shadow all globals with local variables, but uses Object.keys to enumerate over window. Object.keys does not include non-enumerable properties, which includes globalThis. This leaves globalThis intact for us to use

1 year ago 5 0 1 0

You can use globalThis to get access to all globals again and call arbitrary global functions with the help of calcCall. Then just send innerText of the whole site to your server with fetch :)

1 year ago 0 0 1 0
Preview
Post: Pressing Buttons with Popups (on Twitch, LinkedIn and more) | Jorian Woltjer Combining existing research with my own experiments to create a realistic proof of concept that forces an OAuth authorization with a single key press. Learn the ins and outs of popup blockers and focu...

Inspired by x.com/PaulosYibelo, I thought about what improvements I could make to trick users into pressing buttons that perform sensitive actions. Finding some vulnerable targets along the way!
Read the details in my latest blog post below:
jorianwoltjer.com/blog/p/hacki...

1 year ago 5 1 0 0
Preview
'Luften' Is The German Practice We All Should Be Doing In The Winter This ritual may seem counterintuitive, but your well-being will thank you for it.

This calls for Stoßlüften
www.huffpost.com/entry/luften...

1 year ago 2 0 0 0

Wow, thanks for 2nd place! Didn't expect this, maybe it's my sign to finally write it down in text form and tackle all the follow-up ideas 👀

1 year ago 8 1 1 0
Advertisement
CCC | 5-Punkte-Plan für d(on't)-trust Der Chaos Computer Club ist eine galaktische Gemeinschaft von Lebewesen für Informationsfreiheit und Technikfolgenabschätzung.

D-Trust möchte gern von der eigenen Verantwortung für ein großes Datenleck ablenken. Der CCC erklärt die Hintergründe und fordert Konsequenzen. (ja, es war mal wieder 1 von uns lol sorry)
www.ccc.de/de/updates/2...

1 year ago 59 22 4 0
Preview
Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel On November 20, 2024, Shubham Shah and I discovered a security vulnerability in Subaru’s STARLINK admin panel that gave us unrestricted access to all vehicles and customer accounts in the United State...

New blog post with @shubs.io:

We found a vulnerability in Subaru where an attacker, with just a license plate, could retrieve the full location history, unlock, and start vehicles remotely.

Full post here: samcurry.net/hacking-subaru

1 year ago 73 30 5 6

They only fixed a bug that made it easier to abuse this caching info. The bug was with Cloudflare Workers and allowed to run a Cloudflare Worker at a specific data center. From there, the cache state could be retrieved.

The cache info can still be retrieved now using a VPN close to a CF datacenter

1 year ago 3 0 0 0

The voting form says that it closes on the first of February? 😅

1 year ago 0 0 1 0