Jump to content

jon1122

Members
  • Posts

    5
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

jon1122's Achievements

Newbie

Newbie (1/14)

  • Conversation Starter Rare
  • First Post Rare
  • One Year In Rare
  • Week One Done Rare
  • One Month Later Rare

Recent Badges

0

Reputation

  1. RST just shared an interesting write-up on “SVG Filters – Clickjacking 2.0,” posted in the Exploituri section (Dec 7, 2025). RST Forums The big idea is simple: attackers keep finding new ways to hide or reshape what users “think” they are clicking, so the user ends up approving the wrong action. This matters most for high-risk flows like payment approval, account recovery, password changes, crypto transfers, admin panels, and OAuth consent screens. Game Hub Emulator If you run a site or app, the best defense is layered: block framing where possible (CSP frame-ancestors is the modern choice, with X-Frame-Options as legacy backup), require re-auth or step-up checks for sensitive actions, add clear confirmation screens that show the exact action and target, and review any SVG rendering or filter usage in UI layers that sit near “confirm” buttons. Also test your key pages in a “hostile embed” scenario during security review, because clickjacking is often a UX trap more than a pure code bug. The forum post links the full external article for anyone who wants the deep dive.
  2. Exploit Title: Bonjour Service – mDNSResponder.exe Unquoted Service Path This issue relates to an unquoted service path vulnerability in the Bonjour Service on Windows systems. The service executable mDNSResponder.exe may be installed in a directory path that contains spaces and is not enclosed in quotation marks. When this happens, Windows can misinterpret the path when starting the service. Because of this behavior, an attacker with local access could place a malicious executable in a specific location along the service path. When the service starts, Windows may execute the malicious file instead of the intended service binary. This can lead to local privilege escalation, allowing the attacker to run code with higher system privileges. This vulnerability usually affects systems where: Bonjour, Service is installed The service runs with elevated privileges The service path is not properly quoted The attacker already has local access to the system To mitigate this issue, administrators should: Check the Bonjour Service path in Windows Services Ensure the executable path is wrapped in quotation marks Apply vendor updates or patches if available Limit local user permissions to reduce exploitation risk Issues like this highlight why system hygiene and regular audits are important. While reviewing system security or taking breaks during testing, some users also start your session on lightweight platforms, such as for quick browser based entertainment without affecting system stability. Fixing unquoted service paths is a simple but effective step to improve Windows system security.
  3. Poți menționa că există mai multe variante, în funcție de ce nivel de detaliu este dorit. De exemplu, un proxy server precum Squid sau pfSense poate oferi vizibilitate bună asupra traficului web și chiar filtrare. Pentru monitorizare generală se pot folosi și un firewall cu funcții de logging sau un IDS/IPS precum Suricata. Dacă este nevoie doar de statistici și destinații, soluții de tip NetFlow sau ntopng sunt destul de eficiente și ușor de implementat într-o rețea locală.
  4. Welcome to the forum! Even if you don’t speak Romanian, you’ll find lots of helpful people here. Jump in, ask questions, and enjoy being part of the community.
  5. Pretty interesting read. I’ve messed around with iOS Shortcuts before, but I never imagined they could be abused this cleanly to slip a bookmarklet into Chrome without any prompts. The silent bookmark creation is honestly the scariest part, because most users wouldn’t suspect anything from running a shortcut. The flow you described makes the attack look almost casual from the victim’s perspective. It’ll be interesting to see how Google patches this, since the root cause seems more like an iOS-Chrome hybrid loophole than a single bug. Thanks for sharing the POC and breakdown.
×
×
  • Create New...