© 2023 Hashnode
#exploit
In recent years, the increase in cyber attacks has made internet security an essential aspect of our digital lives. One of the most common methods of these attacks is the HTTP PUT vulnerability. HTTP PUT is a method used in the Hypertext Tr…
Below discusses a vulnerability I found in GitHub's OAuth Integration. This affects both Github.com and GitHub Enterprise. TL;DR An attacker that can control the subdomain of a domain used in the Authorization callback URL when configuring …
source :- https://tutorialboy24.blogspot.com/2022/09/exploiting-amazon-simple-notification.html Introduction Countless applications rely on Amazon Web Services’ Simple Notification Service for applica…
When it comes to hacking databases, sometimes we have to dig very deep to find a vulnerability, but other times the information is there for anyone to grab. The following article exposes a simple (yet…
There is a popular (and incredible) geographical game called Geoguessr, where players guess locations from Google Maps Street View imagery. I play it regularly, and I am sure many of you have seen tho…
In this article we will create a simple exploit with Python. NOTE: Since the entire code snippet is not that long, no final code will be provided on GitLab this time. Foreword This article is STRICTL…
What is XML-RPC? XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism WordPress utilizes this XML-RPC that is used to exchange information between computer systems over a net…
This is the write-up for the PWN101 room on TryHackMe, created by Jopraveen. You can find the room (Difficulty: Medium) will all the challenges here. To develop the exploits in this document, I used P…
Learn Windows Hacking by creating a custom tool with python. INTRODUCTION Hi everyone! Do you know how easy it is to hack a windows machine? Well, it turns out that the hacker only needs to create some simple scripts in any language and it …
What Does Rootkit Mean? Rootkits are a type of malware that is designed so that it can remain hidden on your computer. They can contain some tools, ranging from programs that allow hackers to steal …