Tag

exploit

1 views collected around this technical thread.

Raymond Ops
Raymond Ops
Dec 29, 2024 · Information Security

What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats

This article provides a detailed glossary of common hacking terms and techniques—from black‑hat attackers and backdoors to APTs, exploits, and dark‑web concepts—explaining each threat, its purpose, and how it impacts information security.

APTexploithacking
0 likes · 17 min read
What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats
vivo Internet Technology
vivo Internet Technology
May 15, 2024 · Information Security

Analysis of Android FileProvider, startAnyWhere, and Parcel Asymmetric Vulnerabilities and Exploitation

The article dissects three Android flaws—a misconfigured FileProvider, the privileged startAnyWhere capability, and asymmetric Parcel serialization—showing how their interaction lets an attacker hide a malicious Intent, bypass export checks, read private data, alter system settings, and gain elevated privileges, while outlining mitigation strategies.

AndroidFileProviderParcel Vulnerability
0 likes · 19 min read
Analysis of Android FileProvider, startAnyWhere, and Parcel Asymmetric Vulnerabilities and Exploitation
Laravel Tech Community
Laravel Tech Community
Sep 20, 2023 · Information Security

Analysis of a ThinkPHP 6.0 Deserialization Exploit Chain via LeagueFlysystem Cached Storage

This article analyzes a ThinkPHP 6.0 deserialization exploit chain that leverages LeagueFlysystem's cached storage classes, detailing the sequence from __destruct to write, showing how controllable parameters enable arbitrary file writes and providing a proof‑of‑concept demonstration.

LeagueFlysystemPHPdeserialization
0 likes · 7 min read
Analysis of a ThinkPHP 6.0 Deserialization Exploit Chain via LeagueFlysystem Cached Storage
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Oct 21, 2022 · Information Security

DirtyPipe (CVE‑2022‑0847) Vulnerability Analysis and Exploitation on Android/Linux

DirtyPipe (CVE‑2022‑0847) is a high‑severity Linux kernel flaw that lets attackers arbitrarily overwrite any readable file via an uninitialized pipe‑buffer flag, enabling privilege escalation on Android and other systems by patching shared libraries, bypassing SELinux, loading malicious modules, and ultimately gaining root, highlighting urgent need for patches and integrity protections.

Android securityCVE-2022-0847DirtyPipe
0 likes · 17 min read
DirtyPipe (CVE‑2022‑0847) Vulnerability Analysis and Exploitation on Android/Linux
macrozheng
macrozheng
Dec 23, 2021 · Information Security

Why JNDI Is the Hidden Threat Behind Log4j and Other Java Vulnerabilities

The article explains how JNDI works as a configuration and naming service in Java, shows its use with database drivers, and demonstrates how its SPI mechanism can be abused to load remote code, leading to serious security exploits such as the Log4j vulnerability.

JavaReflectionexploit
0 likes · 6 min read
Why JNDI Is the Hidden Threat Behind Log4j and Other Java Vulnerabilities
Architecture Digest
Architecture Digest
Dec 21, 2021 · Information Security

Apache Log4j2 Remote Code Execution Vulnerability Exploitation Guide

This article introduces Apache Log4j2, explains the remote code execution vulnerability caused by unsafe JNDI lookups, provides step‑by‑step environment setup, PoC code, exploitation instructions, and outlines official patches and temporary mitigation measures for developers and security engineers.

JavaMitigationRemote Code Execution
0 likes · 5 min read
Apache Log4j2 Remote Code Execution Vulnerability Exploitation Guide
Top Architect
Top Architect
Dec 20, 2021 · Information Security

Log4j2 Remote Code Execution Vulnerability: Exploitation Steps and Mitigation

This article explains the Log4j2 remote code execution vulnerability, its affected versions, how to set up a test environment, detailed exploit code examples, and recommended mitigation measures including upgrades and JVM configuration changes.

CVE-2021-44228Javaexploit
0 likes · 6 min read
Log4j2 Remote Code Execution Vulnerability: Exploitation Steps and Mitigation
Java Captain
Java Captain
Jun 19, 2021 · Information Security

Spring Boot Vulnerability Exploitation Resources (GitHub Project)

This article introduces a GitHub repository that documents 16 Spring Boot vulnerabilities, detailing information leakage and remote code execution cases, providing step‑by‑step exploitation guides, underlying principles, and analysis for security research and authorized testing.

GitHubJavaSpring Boot
0 likes · 1 min read
Spring Boot Vulnerability Exploitation Resources (GitHub Project)
System Architect Go
System Architect Go
Mar 8, 2021 · Information Security

Insecure Deserialization

This article explains what insecure deserialization is, why it leads to high‑severity attacks, demonstrates typical PHP, Ruby, and Java examples, and provides practical techniques for identifying, exploiting, and mitigating unsafe deserialization vulnerabilities.

JavaPHPdeserialization
0 likes · 27 min read
Insecure Deserialization
Architecture Digest
Architecture Digest
Jan 18, 2021 · Information Security

Authentication Bypass Vulnerability in Nacos 1.4.1 (User‑Agent and Server Identity)

The article analyzes a bypass flaw in Nacos 1.4.1 where the serverIdentity key‑value authentication can be evaded by crafting URLs with a trailing slash, allowing attackers to list, create, and log in as users despite the intended security checks.

Authentication BypassNacosSecurity Vulnerability
0 likes · 8 min read
Authentication Bypass Vulnerability in Nacos 1.4.1 (User‑Agent and Server Identity)
58 Tech
58 Tech
Sep 4, 2020 · Information Security

Understanding ASLR and Buffer Overflow Exploits on Linux

This article explains the concept of Address Space Layout Randomization (ASLR), illustrates how buffer overflow attacks work on Linux, shows step‑by‑step exploitation with disabled ASLR, analyzes memory layout calculations, and discusses the impact of PIE and modern mitigation techniques.

ASLRLinux securityPIE
0 likes · 6 min read
Understanding ASLR and Buffer Overflow Exploits on Linux
360 Tech Engineering
360 Tech Engineering
Jun 21, 2019 · Information Security

A Comprehensive Guide to Office 0‑day/1‑day Vulnerabilities (2010‑2018)

This article expands on the author's BlueHat Shanghai 2019 presentation, summarizing Office‑related 0‑day and 1‑day vulnerabilities discovered between 2010 and 2018, categorizing them by component and type, and providing extensive references, analysis notes, and exploitation guidance for security researchers.

0dayCVEexploit
0 likes · 25 min read
A Comprehensive Guide to Office 0‑day/1‑day Vulnerabilities (2010‑2018)
JD Tech
JD Tech
Jan 21, 2019 · Information Security

Analysis of a PriorityQueue-Based Java Deserialization Gadget Using ysoserial

This article examines how a specially crafted PriorityQueue object, generated via the ysoserial tool, can be serialized and later trigger malicious code execution during Java deserialization, detailing the construction of the gadget, the transformation chain, and the underlying JVM mechanisms that enable the exploit.

GadgetJavaPriorityQueue
0 likes · 13 min read
Analysis of a PriorityQueue-Based Java Deserialization Gadget Using ysoserial
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jul 16, 2015 · Information Security

Analysis of a Node.js Buffer Overflow Vulnerability and Exploit Design

This article analyzes a Node.js buffer‑overflow vulnerability triggered by oversized UTF‑8 decoding, explains the underlying V8 call stack and key functions, demonstrates an exploit using crafted POST requests, and outlines the official security fix that adds proper bounds checking.

Node.jsV8buffer overflow
0 likes · 11 min read
Analysis of a Node.js Buffer Overflow Vulnerability and Exploit Design