Janggggg

1.1K posts

Janggggg banner
Janggggg

Janggggg

@testanull

Kẻ soi mói

Hanoi, Vietnam Beigetreten Ekim 2015
142 Folgt9K Follower
Janggggg
Janggggg@testanull·
@pyn3rd Oh gosh… icic, wtf
English
0
0
1
124
pyn3rd
pyn3rd@pyn3rd·
@testanull “What I’m looking for is a poisoned one — the prefix is ORG, not COM. Just a slight difference :-D
English
1
0
1
134
Janggggg retweetet
watchTowr
watchTowr@watchtowrcyber·
We promised we'd be back! Join us on our journey, from repro'ing N-days to stumbling into 0-days in SolarWinds Web Help Desk, eventually achieving pre-auth RCE. This research fuels the watchTowr Platform, our Preemptive Exposure Management technology. labs.watchtowr.com/buy-a-help-des…
English
0
67
206
39K
Janggggg retweetet
starlabs
starlabs@starlabs_sg·
Ever wondered what happens when you pickle a mailbox? 🥒📬 (No, it’s not a recipe, it’s a vulnerability.) Our team breaks down CVE-2025-20393 in a new deep dive post covering root cause, internals & exploitation details starlabs.sg/blog/2026/01-p… Written by @CurseRed & @bestswngs
English
1
27
86
7.9K
Janggggg retweetet
shubs
shubs@infosec_au·
Oracle Cloud was breached in Jan 2025 through vulns in Oracle Access Manager. @SLCyberSec's Research team found a new pre-auth RCE vulnerability in Oracle Identity Manager (CVE-2025-61757). This is a critical vulnerability and is trivial to exploit. slcyber.io/research-cente…
shubs tweet media
English
0
39
162
14.5K
Janggggg
Janggggg@testanull·
@bienpnn Getting being sold prove it’s really critical, no trash talk, no fantastic scenario 👍
English
0
0
3
1.9K
Janggggg retweetet
Bien 🇻🇳
Bien 🇻🇳@bienpnn·
hot take: maybe instead of reporting vuln and getting cves, security nerds should just sell exploits that way devs won't need to bother with too much reports, only critical one that got exploited would need to be fixed. neat!
English
11
15
205
73.6K
Janggggg retweetet
Stephen Fewer
Stephen Fewer@stephenfewer·
We have published our AttackerKB @rapid7 Analysis for the recent GoAnywhere MFT vuln, CVE-2025-10035. It's an access control bypass + unsafe deserialization + an as-yet unknown issue in how an attacker can know a specific private key! attackerkb.com/topics/LbA9ANj…
English
2
15
61
8.9K
Janggggg retweetet
SinSinology
SinSinology@SinSinology·
NEED YOUR HELP! My Friend/Teacher Soroush (@irsdl) Is looking for a new company to join, you know him as the .NET-God, the guy who has popped exchange, sharepoint, has maintained ysoserial_.net for years, contributed to the exploitation scene numerous times, taught all of you about what .net ghost webshells are, taught you about what viewstate exploitation is, how .net remoting exploitation issues can be solved, iis cookieless, web_config exploitation, countless of blogs, talks, techniques,... but companies keep saying: "we aren't hiring right now!" if i was in position of hiring, woudln't wanna miss out on having one of THE BEST in my team you're retweet is Extremely appreciated ❤️‍🔥 soroush, if you see this, don't hate me, had to do it without telling you
English
13
120
249
82.1K
mufinnnnnnn
mufinnnnnnn@mufinnnnnnn·
I made a quick write up discussing techniques to get code execution against Apache Spark SQL: muffsec.com/blog/getting-c…. I'm looking for advice on how to enumerate all the static methods that take a string argument for each JAR on the classpath.
English
3
16
57
5.4K
Janggggg retweetet
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec/N…
English
1
31
91
7.5K
ϻг_ϻε
ϻг_ϻε@steventseeley·
@mufinnnnnnn Other than that, you can try codeql, not sure if semgrep can do the number of argument filtering. Great blog post mate.
English
2
0
1
1.1K
Janggggg
Janggggg@testanull·
@irsdl Thank you! A reminder, it’s just the temporary solution, may cause exceptions sometime. Applying the official patch is still the best solution!
English
1
0
2
552
Soroush Dalili
Soroush Dalili@irsdl·
Someone sent me this good blog post last night which I had missed testbnull.medium.com/no-one-thing-w… by @testanull This is what I wanted to make a video about today but I don't need to anymore as the blog covers most of the tips (I was surprised seeing CVE-2024–38018 there too as I wanted to also mention it with a new ysonet release - I am still testing the code).
English
1
7
54
4.5K
Janggggg retweetet
Soroush Dalili
Soroush Dalili@irsdl·
Semi-controversial thoughts on the recent #SharePoint patch & CVE-2025-53770 (ToolShell++ or ToolPain 🥸): 🪟On Microsoft’s effort: I now believe MS genuinely tried to fix a flawed patch over the weekend before it was exploited by APTs. But several things went wrong beforehand: - The initial patch left known bypasses which could have been avoided by a bit of testing. - The original Defender workaround could also be bypassed. - MS must have known about the ExcelData gadget since at least 2020: srcincite.io/blog/2020/07/2… but didn’t block it proactively. - SP still relying on a blocklist that might be bypassed. ⌛️On exploitation of CVE-2025-53770: I haven’t seen credible signs the new variant was exploited before the second patch. I know the bypass chain, and none of the public payloads would have worked after the first patch. 🗞️On inaccurate information: This blog post is misleading imho: research.eye.security/sharepoint-und… - It has used CVE-2025-53770 instead of CVE-2025-49704. Anyone reading that blog post would think the new variants were being exploited too. - CVE-2025-49706 (auth check bypass) and its variant, CVE-2025-53771, won't do any good without the deserialization gadget afaik. - It doesn't explain that attackers do not need to write a file to exploit this. Although it is obvious to technical folks, it may not be so obvious to others especially if we are giving advice. - MS remains quiet on whether the vuln was exploited before the first patch. It would have been much better if MS could clear the water. 👎On the fallout: This will likely backfire on some researchers and vendors again due to inaccurate media hype even though this was a real N-day by the looks of it. The part bypassing ParseAssemblyQualifiedName is difficult to be figured out quickly after the patch though; perhaps there are some smart people amongst bad guys too. 🤥On GitHub noise and our community: GitHub is full of AI-generated or miscategorized PoCs for this vuln - e.g. github.com/kaizensecurity… We as a infosec/cybersec community should be better than this. Many of us went after the credit without actually adding much value in addition to what was published already. I for one thought the bypasses are also being exploited too at some point last week (it was hard to verify them with all the noise and limited access to a working lab). I salute those amongst us who keep calm and keep the world safer - no headlines, no ego, just consistent work that makes a real difference.🫡
Soroush Dalili@irsdl

Does anyone have a payload for CVE-2025-53770 (toolshell++), I have a feeling that what we have seen so far are related to CVE-2025-49704, and CVE-2025-53770 has not been exploited by malicious actors. Please prove me wrong! I'm not interested in the auth bypass part btw.

English
4
38
149
28.1K
Janggggg
Janggggg@testanull·
@irsdl You are absolutely rights :)! The media want people to believe that an 0day is being exploited itw. But the fact it wasn’t
English
1
0
10
1.6K
Soroush Dalili
Soroush Dalili@irsdl·
Does anyone have a payload for CVE-2025-53770 (toolshell++), I have a feeling that what we have seen so far are related to CVE-2025-49704, and CVE-2025-53770 has not been exploited by malicious actors. Please prove me wrong! I'm not interested in the auth bypass part btw.
English
2
6
83
39.1K