Mohanraj Rbinarysouljour.me·Dec 5, 2024CVE-2024-46455 : XML eXternal Entity vulnerability in unstructured.io <= 0.14.2Before proceeding I would like to give a shoutout to my awesome friend and colleagueMohit Kwho tagged along in this journey and played a pivotal role. Summary This blog is a result of the applied vulnerability research that we did against open-webui...1 like·420 readsCVE
Auth0x78forGDSC NIT Silchar Blogblog.gdscnits.in·Nov 25, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...2 likes·249 readsBuffer Overfow
Rivanorthblog.rivanorth.com·Nov 5, 2024Vulnerability Report: November 2024Welcome to the monthly Vulnerability Report. In this report, we provide an overview of the most significant security vulnerabilities identified in the past month. Our focus is on vulnerabilities that are being actively exploited, which pose the bigge...Security AdvisoryCVE
J3bitokjebitok.hashnode.dev·Oct 30, 2024Exploitation Basics: Metasploit: Exploitation (TryHackMe)In this article, I will write a write-up for Metasploit: Exploitation that covers the Scanning, The Metasploit Database, Vulnerability Scanning, Exploitation, and Msfvenom. I would be lying if I said going through this room was easy. I had to researc...317 readsmetasploit
Auth0x78auth0x78-blog.hashnode.dev·Oct 10, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...1 like·44 readsBuffer Overfow
Rivanorthblog.rivanorth.com·Aug 2, 2024Vulnerability Report: August 2024Welcome to the monthly Vulnerability Report. In this report, we provide an overview of the most significant security vulnerabilities identified in the past month. Our focus is on vulnerabilities that are being actively exploited, which pose the bigge...Security AdvisoryCVE
Achal Tiwariachaltiwari.hashnode.dev·Jul 22, 2024ShellCode 1.0Hey there! Today, we're diving into the fascinating and somewhat intimidating world of shellcode. If you've ever wondered how hackers manage to take control of a compromised machine, shellcode is often a big part of the answer. Let's break it down to...Malware
Corey Gardnercoreyscorner.hashnode.dev·Apr 25, 2024Safeguarding the Stack: Ornithology of Stack CanariesDuring the industrial era canaries were given the unforgiving job of determining if working conditions were "safe" for coal miners. Within coal mines toxic fumes can build up, and oxygen can become scarce. The life of the canary was a litmus test for...26 readsStack Overflow
Reza Rashidiblog.redteamguides.com·Apr 25, 2024ASLR Exploitation TechniquesAddress Space Layout Randomization (ASLR) is a security technique used in operating systems to protect against certain types of cyber attacks, particularly buffer overflow attacks. Here’s an overview of ASLR: What is ASLR? ASLR is a feature implement...2.2K readsaslr
Sukrit Duasukritdua.com·Mar 8, 2024Android Hacking - Part 5Activities What is an Activity? Activities are simply the screens we see when we open an application. Let's say we are greeted with the following Screens (Activities) Login page (LoginActivity.java) Profile page (ProfileActivity.java) Settings pag...27 readsMobile Security Android