| https://twitter.com/justinsteven | |
| Twitch | https://www.twitch.tv/justinsteven |
| YouTube | https://www.youtube.com/justinsteven |
| www | https://www.justinsteven.com |
| https://twitter.com/justinsteven | |
| Twitch | https://www.twitch.tv/justinsteven |
| YouTube | https://www.youtube.com/justinsteven |
| www | https://www.justinsteven.com |
You've suggested "poison the access logs and execute them" despite the fact that the challenge uses a shell to `rm` the filename you give it; it doesn't execute it. You've also suggested "simply execute a system-level reverse shell" by "determining most-likely binary available in target OS to establish command exec" but you haven't shown _how_ to get command exec.
Now you're saying to wget something off of 127.0.0.1 without saying if you're doing that locally on your machine, or if you're doing it on the victim's machine - in which case you're nowhere near being able to execute arbitrary commands on their machine yet, and if you could why would you want to wget their localhost anyway?
You don't then get to say "in the meantime someone else already posted similar solutions" like you were on the right track. Sorry, but you just weren't.
The challenge was "how do you achieve command injection?" not "what would you do with command injection?"
The trick used in the solutions we know work was that file_exists() will honour a URL such as ftp:// to check the existence of a file, at which point you have various places inside a ftp:// URL to hide a command injection trigger (I originally used the username/password part, and bitquark used the fragment which I think is super clever)
Saying "nice trick" or "interesting, TIL" or "yeah gotcha that makes sense" would parse. Saying nothing at all would be appropriate. Saying "that's what I was saying all along!" which is how what you're saying sounds to me (but it might just be me) just doesn't make sense. Take the L.
A DOM XSS vulnerability in Gartner's Peer Insights Widget affected the sites of Gradle, LogRhythm, SentinelOne, Synopsys, Veeam, Vodafone and more. Details of the bug, the patch, the bypass, and the final patch are up at https://gartner.com.ring0.lol/
Also, when this toot is two hours old (12pm Sydney time) I'll be live at https://twitch.tv/justinsteven breaking down how I found the bug and how it all worked. If you can't make it then it'll be on YouTube in the coming days, but if you can, come say hi! ❤️
OK, so what does fidget mean? What information do you have around you, right now? Take a deeper look. Why is that WiFi AP named XNF998FE? Why is your laptop's serial number XY3327S? How often is that helicopter circling? Why are so many license plates from a particular state with a specific prefix? Look for the lack of entropy that is an encoded signal.
In the early Metasploit days this involved dumping function addresses of DLLs from a literal binder of DVDs. The opcode database and later analysis by folks like skape (matt miller) and spoonm made exploit development much easier as a result.
Scanning the internet is easy. Understanding all the data coming back takes a lifetime. Grab some data dumps and sift through specific protocols and fields. Toss Fiddler at a Windows thick client (or enable HTTP event tracing).
We are flooded in dodgy software, weak numeration, and information leaks. Stop for a bit, breath, pick one, and go deep.