science and technology

Brazilian Firm Exposes Personal Details Of Thousands Of Soccer Fans





science and technology

Phrack - Attacking JavaScript Engines

Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622.




science and technology

Digital Whisper Electronic Magazine #87

Digital Whisper Electronic Magazine issue 87. Written in Hebrew.




science and technology

POC OR GTFO 0x16

This is the sixteenth issue of POC || GTFO.




science and technology

Digital Whisper Electronic Magazine #88

Digital Whisper Electronic Magazine issue 88. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #89

Digital Whisper Electronic Magazine issue 89. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #90

Digital Whisper Electronic Magazine issue 90. Written in Hebrew.




science and technology

POC OR GTFO 0x17

This is the seventeenth issue of POC || GTFO.




science and technology

.NET Instrumentation Via MSIL Bytecode Injection

Whitepaper from Phrack called .NET Instrumentation via MSIL bytecode injection.




science and technology

Digital Whisper Electronic Magazine #92

Digital Whisper Electronic Magazine issue 92. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #93

Digital Whisper Electronic Magazine issue 93. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #94

Digital Whisper Electronic Magazine issue 94. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #95

Digital Whisper Electronic Magazine issue 95. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #96

Digital Whisper Electronic Magazine issue 96. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #97

Digital Whisper Electronic Magazine issue 97. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #98

Digital Whisper Electronic Magazine issue 98. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #99

Digital Whisper Electronic Magazine issue 99. Written in Hebrew.




science and technology

Phrack - Viewer Discretion Advised - (De)coding An iOS Kernel Vulnerability

Phrack Viewer Discretion Advised write up called (De)coding an iOS Kernel Vulnerability.




science and technology

Digital Whisper Electronic Magazine 100

Digital Whisper Electronic Magazine issue 100. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #101

Digital Whisper Electronic Magazine issue 101. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #102

Digital Whisper Electronic Magazine issue 102. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #103

Digital Whisper Electronic Magazine issue 103. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #105

Digital Whisper Electronic Magazine issue 105. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #106

Digital Whisper Electronic Magazine issue 106. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #107

Digital Whisper Electronic Magazine issue 107. Written in Hebrew.




science and technology

Digital Whisper Electronic Magazine #104

Digital Whisper Electronic Magazine issue 104. Written in Hebrew.




science and technology

Linux/x86_64 TCP/4444 Bindshell With Password Shellcode

129 bytes small Linux/x86_64 bind (4444/TCP) shell (/bin/sh) + password (pass) shellcode.




science and technology

Linux/MIPS64 Reverse Shell Shellcode

157 bytes small Linux/MIPS64 reverse (localhost:4444/TCP) shell shellcode.




science and technology

Linux/x86_64 Reverse Shell TCP/4444 With Password Shellcode

120 bytes small Linux/x86_64 reverse (127.0.0.1:4444/TCP) shell (/bin/sh) + password (pass) shellcode.




science and technology

Linux/x86 TCP Reverse Shell 127.0.0.1 Nullbyte Free Shellcode

Linux/x86 TCP reverse shell 127.0.0.1 nullbyte free shellcode.




science and technology

Linux/x86 Bind TCP Port 43690 Null-Free Shellcode

53 bytes small Linux/x86 bind TCP port 43690 null-free shellcode.




science and technology

Covert Channel And Data Hiding In TCP/IP

Whitepaper called Covert Channel and Data Hiding in TCP/IP.




science and technology

FreeSWITCH Event Socket Command Execution

This Metasploit module uses the FreeSWITCH event socket interface to execute system commands using the system API command. The event socket service is enabled by default and listens on TCP port 8021 on the local network interface. This module has been tested successfully on FreeSWITCH versions: 1.6.10-17-726448d~44bit on FreeSWITCH-Deb8-TechPreview virtual machine; 1.8.4~64bit on Ubuntu 19.04 (x64); and 1.10.1~64bit on Windows 7 SP1 (EN) (x64).




science and technology

Ubuntu Security Notice USN-4197-1

Ubuntu Security Notice 4197-1 - It was discovered that Bind incorrectly handled certain TCP-pipelined queries. A remote attacker could possibly use this issue to cause Bind to consume resources, resulting in a denial of service.




science and technology

Debian Security Advisory 4577-1

Debian Linux Security Advisory 4577-1 - Tim Dusterhus discovered that haproxy, a TCP/HTTP reverse proxy, did not properly sanitize HTTP headers when converting from HTTP/2 to HTTP/1. This would allow a remote user to perform CRLF injections.




science and technology

Linux/x64 Reverse TCP Stager Shellcode

188 bytes small Lnux/x64 reverse TCP stager shellcode.




science and technology

Sagemcom Fast 3890 Remote Code Execution

This exploit uses the Cable Haunt vulnerability to open a shell for the Sagemcom F@ST 3890 (50_10_19-T1) cable modem. The exploit serves a website that sends a malicious websocket request to the cable modem. The request will overflow a return address in the spectrum analyzer of the cable modem and using a rop chain start listening for a tcp connection on port 1337. The server will then send a payload over this tcp connection and the modem will start executing the payload. The payload will listen for commands to be run in the eCos shell on the cable modem and redirect STDOUT to the tcp connection.




science and technology

CHIYU BF430 TCP IP Converter Cross Site Scripting

CHIYU BF430 TCP IP Converter suffers from a persistent cross site scripting vulnerability.




science and technology

MQTT Protocol Overview

This whitepaper provides an overview of the MQTT protocol. MQTT is a is an open OASIS and ISO standard (ISO/IEC PRF 20922) lightweight, simple machine to machine TCP/IP based protocol which can be used for communication between IoT devices.




science and technology

Red Hat Security Advisory 2020-1000-01

Red Hat Security Advisory 2020-1000-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. A heap-based overflow was addressed.




science and technology

Red Hat Security Advisory 2020-1289-01

Red Hat Security Advisory 2020-1289-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability.




science and technology

Red Hat Security Advisory 2020-1290-01

Red Hat Security Advisory 2020-1290-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include an out of bounds write vulnerability.




science and technology

Red Hat Security Advisory 2020-1288-01

Red Hat Security Advisory 2020-1288-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability.




science and technology

Red Hat Security Advisory 2020-1702-01

Red Hat Security Advisory 2020-1702-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Issues addressed include a heap overflow vulnerability.