Hakan Yavuz
Hakan Yavuz
Konu senindir, istersen makaleyle ilgili gelişmeleri buraya yorum olarak girebilirsin, kendin içinde bir çalışma tablosu oluşturmuş olursun.
Konu senindir, istersen makaleyle ilgili gelişmeleri buraya yorum olarak girebilirsin, kendin içinde bir çalışma tablosu oluşturmuş olursun.
I have updated the PR to include a method parameter. Now, users can specify -o METHOD=petitpotam to test only the PetitPotam vulnerability. As a security researcher, I want to see...
> Nice addition, but it would be better to have the right name for the option imo :) > > -METHOD=petitpotam -METHOD=dfscoerce -METHOD=printerbug actually i want supports shorthand method names....
@Marshall-Hallenbeck i guess its fixed.
I have two possible explanations for this issue: ### 1. Differences in `binding_params` within `coerce_plus` There are minor discrepancies between the original code and `coerce_plus`: https://github.com/Pennyw0rth/NetExec/blob/da8ef0f0fb37c1a6d73bb841b675f64d9d68b3c6/nxc/modules/coerce_plus.py#L222-L227 - In `stringBinding`, the...
> Note for future me: we should probably merge all the "drop stuff on share" modules (slinky, scuffy, drop-sc, drop-library-ms) into one, similar to coerce_plus. ahaha its already on the...
If you do not see the message “Exploit Success, eventlog\ElfrOpenBELW” when using the LISTENER parameter, [NetExec coerce_plus.py - Line 923](https://github.com/Pennyw0rth/NetExec/blob/main/nxc/modules/coerce_plus.py#L923C46-L923C83), it means the MSEven vulnerability has been fixed. if host...
unfixed code is ```php if ($_SERVER['HTTP_X_FORWARDED_FOR']) { $ip = $_SERVER['HTTP_X_FORWARDED_FOR']; } else { $ip = $_SERVER['REMOTE_ADDR']; } DBQuery("INSERT INTO hacking_log (HOST_NAME,IP_ADDRESS,LOGIN_DATE,VERSION,PHP_SELF,DOCUMENT_ROOT,SCRIPT_NAME,MODNAME,USERNAME) values ('$_SERVER[SERVER_NAME]','$ip','" . date('Y-m-d') . "','$openSISVersion','$_SERVER[PHP_SELF]','$_SERVER[DOCUMENT_ROOT]','$_SERVER[SCRIPT_NAME]','$_REQUEST[modname]','" . User('USERNAME') ....
> Hey dude! > > Really nice PR! Is there a way you can retrieve the event log files without running additional execute() operation ? Hm, maybe we use even/even6,...