Chaining Multiple Website Vulnerabilities: My First Bug Hunt
Tags
attack-pattern: | Data Powershell - T1059.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Tool - T1588.002 Vulnerabilities - T1588.006 Powershell - T1086 |
Common Information
Type | Value |
---|---|
UUID | bcc540ab-0b7c-4f29-a6a2-ef13c733b877 |
Fingerprint | 854b99d007175785 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | July 17, 2023, 6:58 p.m. |
Added to db | July 17, 2023, 9:29 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Chaining Multiple Website Vulnerabilities: My First Bug Hunt |
Title | Chaining Multiple Website Vulnerabilities: My First Bug Hunt |
Detected Hints/Tags/Attributes | 32/1/10 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 4128 | github.com |
|
Details | Domain | 1 | soroush.secproject.com |
|
Details | Domain | 32 | ysoserial.net |
|
Details | File | 1 | file_inclusion_windows.txt |
|
Details | File | 7 | applicationhost.config |
|
Details | File | 70 | web.config |
|
Details | File | 4 | c:\windows\temp\test.txt |
|
Details | Github username | 8 | carlospolop |
|
Details | Url | 1 | https://github.com/carlospolop/auto_wordlists/blob/main/wordlists/file_inclusion_windows.txt |
|
Details | Url | 1 | https://soroush.secproject.com/blog/2019/04/exploiting-deserialisation-in-asp-net-via-viewstate |