Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

NAS Command Injection with an Auth Bypass- 157

ISEPosted 6 Years Ago
  • The host header being set to 127.0.0.1 bypasses all authentication!
  • The unwritten API is quite cool too! Because the APIs just check for all functions in a file, without an underscore (private function) then all of the IMPORTS will also work as API endpoints. So genius!
  • Finding exploits just take a long time! A lot of recon and testing.