People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
asus_token starts with a Null (0x0)ifttt_token (default state)Null is because the validation of the ifttt_token returns NULL if the functionality is not in use. If the ifttt_token is the same as the asus_token this returns Null. asusrouter-- user agent. However, it is common for a header or UA to be used to denote if an internal service is being used. In this case, it is not a security issue but rather something to hit the service at all. \0 to my input fuzzer list after reading this article. SCM_RUN_FROM_PACKAGE. The code downloaded for the Azure function package had the r+w flag on the SAS token. By altering this package, an attacker could secretly plant a backdoor on the code package for the functions using this box. x-ms-site-restricted-token header used for authorization was extremely verbose on its error messages. Because of this verbosity the attacker was attempting to launch a padding oracle attack against this endpoint. AppArmor is a Linux kernel security module that allows the system to restrict the capabilities on a per-profile basis. AppArmor. The profile for the synosearchagent profile did not restrict access to loading kernel modules. Now, by using the insmod command it is trivial to run code inside of the kernel. dbutil_2_3.sys) and found several vulnerabilities in it. memmove an arbitrary read/write vulnerability has been given to the user. Damn! git_diff repository to see how the merge functionality worked. git_diff added file information for where to write the file to directly into the file! With this in mind, it was possible to make a 0 line change PR that could overwrite a Ruby file in Homebrew itself. git_diff. Instead, it was using the code in an unattended way; the authors of git_diff never expected an attacker to be able to control the file information when writing the tool. Overall, interesting finding where the issue is with the integration of technology. limit exceeded error, this limit could be bypassed using concurrent request via Burp Turbo. NXP LPC55S69 ROM they found an interesting piece of undocumented functionality that allowed them to update the ROM. Sadly (or good for attackers), this code is accessible by non-secure, unprivileged user code thus allowing attackers to make runtime modifications to purportedly trusted APIs.