Decoder++ – An Extensible Application For Penetration Testers And Software Developers To Decode/Encode Data Into Various Formats

KitPloit - PenTest Tools!-- An extensible application for penetration testers and software developers to decode/encode data into various formats.Setup Decoder++ can be either installed by using pip or by pulling the source from this repository: # Install using pippip3 install decoder-plus-plus Overview This section provides you with an overview about the individual ways of interacting … Continue reading Decoder++ – An Extensible Application For Penetration Testers And Software Developers To Decode/Encode Data Into Various Formats

Google patches actively exploited zero-day bug that affects Chrome users

Malwarebytes Labs-- Google has recently released Chrome version 86.0.4240.111 to patch several holes. One is for a zero-day flaw – that means a vulnerability that is being actively exploited in the wild. The flaw, which is officially designated as CVE-2020-15999, occurs in the way FreeType handles PNG images embedded in fonts using the Load_SBit_Png function. … Continue reading Google patches actively exploited zero-day bug that affects Chrome users

CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration

KitPloit - PenTest Tools!-- Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence of DLL injection (classic or reflective injection) and performs a YARA scan on the target process' memory for Cobalt Strike v3 and v4 beacon signatures. Alternatively, CobaltStrikeScan can perform the same … Continue reading CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration

Accidental Observation to Critical IDOR

InfoSec Write-ups - Medium-- Insecure Direct Object Reference falls under the category for Broken Access Controls as per OWASP TOP 10 (2017 Edition). This issue usually occurs due to weak implementation of the application’s access control logics which links an identifier or an object to a particular asset say user_id parameter defines which user’s data … Continue reading Accidental Observation to Critical IDOR

Accidental Observation to Critical IDOR

InfoSec Write-ups - Medium-- Insecure Direct Object Reference falls under the category for Broken Access Controls as per OWASP TOP 10 (2017 Edition). This issue usually occurs due to weak implementation of the application’s access control logics which links an identifier or an object to a particular asset say user_id parameter defines which user’s data … Continue reading Accidental Observation to Critical IDOR

Bypassing WAF to do Error-Based SQL Injection

InfoSec Write-ups - Medium-- Bypassing WAF to do advanced Error-Based SQL InjectionDuring penetration testing, I faced with a website which on this article I will name it as http://domain.comWhile browsing the website, I didn’t see any single Parameter, even though the website was built with PHP. I quit browsing and started to Google Dorking.Google Dorking to … Continue reading Bypassing WAF to do Error-Based SQL Injection