People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
F4:50:EB:2E:58:00. After many attempts, including the use of ethtool and RtPGtoolUI from Realtek, they were able to burn the MAC address of the adapter. Sadly, the adapter always goes to eth1 instead of eth0. .ttf. Additionally, it doesn't address the fact that arbitrary contents can be present in a font file or the arbitrary file upload issue. The author decided to look for a work around for the original patch.phar:// URI could be put into any HTML elements. To fix this vulnerability, an allowlist of URIs was put into DomPDF. getFileContent) still parses phar:// and file:// URIs. Because of the issue mentioned above, we can use the phar:// URI to trigger a deserialization vulnerability for code execution. isRemoteEnabled option has to be enabled in order to trigger the vulnerability. However, by caching the data:// URI in the CSS file, we can store this as a file. Then, in a second request, we can request the data file path as a phar file. This removes the need for the special flag to be enabled.') in a field for time, a 400 error occurred. However, when putting two single quotes ('') into the field, the request returned a valid response!/**/ comments within the attack query. Can we take this further? root. Additionally, stacked queries was enabled, making exploitation much easier. By using the stacked query functionality to call COPY command (known technique)to run shell commands. cmd_start took in a user controlled target address and wrote user controllable writable data. This feels like a vulnerability by design!contentcert and keycert. For whatever reason, the contentcert performed 0 validation and return correctly. check_destroy is used to delete the connection object once both the read and write flags are cleared. These flags are modified regardless of how many open requests there are. As a result, after the first write occurs, the connection will be destroyed, even though there is another call in the queue. block.timestamp) are used for logic. Actions such as sending ETH and entropy are common uses for timestamps because they create some randomness. receive_erc20_tokens takes a structure for &args. From the args, it parses takes out a msg field and validates the length. After this, the function parsers the recipients address out of the message to ensure its valid. It also checks if a fee that should be paid to the message relayer was also supplied in the message or not.args field. This gets send to the owner of the bridge, which we created ourselves.