Advertisement · 728 × 90

Posts by ϻг_ϻε

Preview
General Graboids: Worms and Remote Code Execution in Command & Conquer — Atredis Partners [this work was conducted collaboratively by Bryan Alexander and Jordan Whitehead] This post details several vulnerabilities discovered in the popular online game Command & Conquer: Generals. We…

Command & Conquer'd: worming RCEs through a classic multiplayer game. Check out the full writeup from our @districtcon.bsky.social Junkyard submission here:
www.atredis.com/blog/2026/1/...
By @droner.bsky.social and @jordan9001.bsky.social

#Security #modding #rce

2 months ago 9 8 0 2

Oh I nearly forgot about this platform

2 months ago 5 0 0 0
Samstung Part 1 :: Remote Code Execution in MagicINFO 9 Server One weekend, I decided to unpack some of the patches that Samsung have been sending out for their MagicINFO 9 solution. During this process, I discovered mul...

@steven.srcincite.io did some cool stuff, check it out!

srcincite.io/blog/2026/01...

2 months ago 3 2 0 0
Preview
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.

If you're using ruby-saml or omniauth-saml for SAML authentication make sure to update these libraries as fast as possible! Fixes for two critical authentication bypass vulnerabilities were published today (CVE-2025-25291 + CVE-2025-25292).

github.blog/security/sig...

1 year ago 11 10 1 0
A close-in image of a protoplanetary disc around a newly formed star. Many different wavelengths of light are combined and represented by separate and various colors. A dark line across the center is the disc, made of opaque dust: the star is hidden in here and creates a strong glow in the center. A band going straight up is a jet, while other outflows form flares above and below the disc, and a tail coming off to one side.

A close-in image of a protoplanetary disc around a newly formed star. Many different wavelengths of light are combined and represented by separate and various colors. A dark line across the center is the disc, made of opaque dust: the star is hidden in here and creates a strong glow in the center. A band going straight up is a jet, while other outflows form flares above and below the disc, and a tail coming off to one side.

NEW JWST IMAGE SHOWING A PROTOPLANETARY DISK AROUND A NEWLY FORMED STAR!!! 🤩

1 year ago 1016 210 30 12
Post image

Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! github.blog/security/vul...

1 year ago 29 16 1 0
Preview
a cartoon character is holding a bunch of money and the words shut up and are above him ALT: a cartoon character is holding a bunch of money and the words shut up and are above him
1 year ago 1 0 0 0
Abstaining From Pwn2own – muffSec

This is what I love about Chris, authenticity: muffsec.com/blog/abstain.... Btw I couldn’t agree more with his conclusion about the event.

1 year ago 3 0 0 0

Bitcoin is enemy of culture because it introduces monetary incentive where only prestige belongs.

1 year ago 174 15 2 1
Advertisement
Post image

I wrote a PoC for the recent Ivanti Connect Secure stack buffer overflow, CVE-2025-0282, based on the exploitation strategy watchTowr published, along with an assessment of exploitability given the lack of a suitable info leak to break ASLR: attackerkb.com/assessments/...

1 year ago 11 8 1 0

What's the point of being rich if you can't afford to do the right thing.

1 year ago 27412 4133 732 239
Preview
Top ten web hacking techniques of 2024: nominations open Nominations are now open for the top 10 new web hacking techniques of 2024! Every year, security researchers from all over the world share their latest findings via blog posts, presentations, PoCs, an

Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here:
portswigger.net/research/top...

1 year ago 28 19 1 4
Project Zero

Just unrestricted an issue that shows a fun new attack surface. Android RCS locally transcribes incoming media, making vulnerabilities audio codecs now fully-remote. This bug in an obscure Samsung S24 codec is 0-click

project-zero.issues.chromium.org/issues/36869...

1 year ago 38 16 1 2
Aleph Bass — an aleph bet song by Darshan :: אלף בית – דרשן
Aleph Bass — an aleph bet song by Darshan :: אלף בית – דרשן YouTube video by Darshan Project

youtu.be/a6EnyQ0Dy50?...

1 year ago 1 0 0 0

Positive Technologies published two scenarios they encountered during pentests, where they pivot to the internal network thanks to an Internet-facing Exchange server and its numerous SSRF vectors 💎

1 year ago 6 3 1 0

Nice fail troll

1 year ago 0 0 0 0
Advertisement

TIL how easy it is to ask curl to dump TLS session keys to disk 🛠️

Simply set the environment variable `SSLKEYLOGFILE=/path/to/file` 😅 Note: it also works for Firefox and Chrome

Extremely useful when combined with Wireshark 👍

1 year ago 134 36 6 0

CVE-2024-12727 Sophos coming in with an unauthenticated SQLi in their firewall appliance 👏

1 year ago 93 26 2 5
Preview
PentesterLab Blog: Another JWT Algorithm Confusion Vulnerability: CVE-2024-54150 Discover how a code review uncovered a JWT algorithm confusion vulnerability (CVE-2024-54150). Learn key insights to enhance your security skills and spot vulnerabilities effectively.

These are some really nice blog posts regarding algo confusion bugs in JWT by @pentesterlab.com pentesterlab.com/blog/jwt-alg... & pentesterlab.com/blog/another... nice one @snyff.pentesterlab.com!

1 year ago 20 5 1 0
Post image

Life doesn’t need to be complicated

1 year ago 2 0 0 0
HEXACON2023 - Exploiting Hardened .NET Deserialization by Piotr Bazydło
HEXACON2023 - Exploiting Hardened .NET Deserialization by Piotr Bazydło YouTube video by Hexacon

[4/n] My Hexacon 2023 talk about .NET Deserialization. New gadgets, insecure serialization (RCE through serialization) and custom gadgets found in the products codebase.

Talk: www.youtube.com/watch?v=_CJm...

White paper: github.com/thezdi/prese...

1 year ago 5 2 0 0

I put together a VERY limited (for now) list of web hackers in a Starter pack:

go.bsky.app/9uay4Ad

A lot of people are missing (I will try to add more as I find them) but make sure you follow people already in the list!

1 year ago 31 14 3 0

It’s a different poc per app that’s vulnerable. Most struts apps that use a vuln framework are probably not vuln because they still need to implement an upload feature in a specific way. TL;DR don’t lose sleep over it.

1 year ago 3 1 1 0

S2-067 is a fantastic bypass of the patch for S2-066. It uses ONGL to re-write the upload filename property in order to bypass the filename path traversal checks.

PoC: if the target bean is called "UploadFile" the your target parameter is "top.UploadFileFileName". 🤯

1 year ago 6 2 0 0
Advertisement
screenshot of the CFP on phrack.org

screenshot of the CFP on phrack.org

We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy!

phrack.org

1 year ago 116 58 4 4
Post image

wokism is out of control

1 year ago 6934 372 102 13

…and what is your office? My office is that which is in the higher aspirant of the soul - Ma’at

1 year ago 0 0 0 0

Mexico is always a good idea, though I maybe biased :D

1 year ago 3 0 0 0

A companion blog to my Bluehat 2024 presentation on OleView.NET is up now. googleprojectzero.blogspot.com/2024/12/wind...

1 year ago 20 12 0 1