Blog
- Home
- Blog
Conteúdos
Blog sobre Segurança da Informação, Comandos Linux e ROS
Comandos Linux – Comando vim
Comando Linux vim Nos sistemas operacionais do tipo Unix, o vim , que significa ” Vi Improved”, é um editor de texto . Ele pode ser usado para editar qualquer tipo de texto e é especialmente adequado
Comandos Linux – Comando gzip
Comandos Linux gzip, gunzip e zcat Em sistemas operacionais do tipo Unix, o comando gzip cria, lista, modifica e extrai dados dos arquivos GZIP . O comando gunzip extrai dados dos arquivos GZIP. O comando zcat imprime o
Comandos Linux – Comando Talk
Comando de conversa do Linux Em sistemas operacionais do tipo Unix, o comando talk fornece uma interface de bate-papo por texto que permite a comunicação em tempo real com outros usuários
Cisco Small Business 220 Series – Multiple Vulnerabilities
Cisco Small Business 220 Series – Multiple Vulnerabilities #!/usr/bin/python2.7 # “”” [Subject] Realtek Managed Switch Controller (RTL83xx) PoC (2019 bashis) https://www.realtek.com/en/products/communications-network-ics/category/managed-switch-controller [Brief description] 1. Boa/Hydra
DameWare Remote Support 12.1.0.34 – Buffer Overflow (SEH)
DameWare Remote Support 12.1.0.34 – Buffer Overflow (SEH) #!/usr/bin/env python # Author: Xavi Beltran # Contact: [email protected] # Exploit Development: https://xavibel.com/2019/08/31/seh-based-local-buffer-overflow-dameware-remote-support-v-12-1-0-34/ # Date: 14/7/2019 #
kic 2.4a – Denial of Service
kic 2.4a – Denial of Service # Exploit Title: Ciftokic 2.4a – DoS Buffer Overflow # Date: September 30, 2019 # Exploit Author: @JosueEncinar #
PHP 7.1 < 7.3 - 'json serializer' Disable Functions Bypass
PHP 7.1 < 7.3 – ‘json serializer’ Disable Functions Bypass <?php $cmd = “id”; $n_alloc = 10; # increase this value if you get segfaults
vBulletin 5.0 < 5.5.4 - 'widget_php ' Unauthenticated Remote Code Execution
vBulletin 5.0 < 5.5.4 – ‘widget_php ‘ Unauthenticated Remote Code Execution #!/usr/bin/python # # vBulletin 5.x 0day pre-auth RCE exploit # # This should work
DotNetNuke < 9.4.0 - Cross-Site Scripting
DotNetNuke < 9.4.0 – Cross-Site Scripting # Exploit Title: Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 # Exploit Description : This exploit will
WebKit – UXSS Using JavaScript: URI and Synchronous Page Loads
WebKit – UXSS Using JavaScript: URI and Synchronous Page Loads DETALHES DA VULNERABILIDADE “ “ void DocumentWriter :: replaceDocument (const String & source, Document *