Practicing AWS security with IAMVulnerable
When I started my career I got super excited entering these dark rooms, with blinking lights and cold air. Yes, I'm talking about good old data centers, with old-fashioned server racks belonging to va…
When I started my career I got super excited entering these dark rooms, with blinking lights and cold air. Yes, I'm talking about good old data centers, with old-fashioned server racks belonging to va…
Weak default credentials in combination with missing input validation allow a remote attacker to execute arbitrary code on a server using the Zmanda Management Console 3.3.9. Description It's possibl…
Imagine we’ve a reflected XSS on https://test-site.com and the following characters are filtered: spaces, (single) quotes, <, >, } and {. But you also want to develop a weaponized exploit to exf…
Recently I found an interesting file on uppd.gov.si called nakazila.xls (translated: wire transfers) while I was doing some reconnaissance for a bug bounty program. After verifying that the file was p…