mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#exploitdev

0 posts0 participants0 posts today
ς๏гєɭคภς0๔3г :verified:<p>Your exploit dev training journey starts right here! </p><p>Corelan’s “Expert-Level Stack” exploit dev course for Windows 11 delivers unmatched depth, quality, and hands-on experience. </p><p>What our students say on the <a href="https://infosec.exchange/tags/Corelan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Corelan</span></a> Stack course:</p><p>🗣️ “Peter will refute about every single thing you might have learned so far related to the topic in other courses… and then teach you it the right way from the ground up”</p><p>See for yourself: 👉🏼👉🏼👉🏼 <a href="https://bit.ly/corelan-training" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/corelan-training</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/corelan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>corelan</span></a> <a href="https://infosec.exchange/tags/stack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stack</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/win11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>win11</span></a></p>
ς๏гєɭคภς0๔3г :verified:<p>Moving from Slack to Discord. You're welcome to join, hang out, contribute to the community. Be nice. discord.gg/DjfR5ntXrb <a href="https://infosec.exchange/tags/corelancommunity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>corelancommunity</span></a> <a href="https://infosec.exchange/tags/corelantraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>corelantraining</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/safeplace" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>safeplace</span></a></p>
postmodern<p>Already enjoying the <a href="https://exploits.club/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploits.club/</span><span class="invisible"></span></a> newsletter. Don't let the "coming soon..." website fool you, the content is high quality.</p><p><a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/ExploitDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExploitDevelopment</span></a></p>
postmodern<p>TIL <a href="https://blog.exploits.club/" rel="nofollow noopener noreferrer" target="_blank">exploits.club</a> and <a href="https://bug.directory/" rel="nofollow noopener noreferrer" target="_blank">bug.directory</a>.</p><p><a href="https://infosec.exchange/tags/exploitsclub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitsclub</span></a> <a href="https://infosec.exchange/tags/bugdirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugdirectory</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a></p>
postmodern<p>How common is RC4 vs. RC5 in the wild? I assume there's still plenty of vulnerable legacy software out there that's still using RC4. Would still supporting RC4 be useful for writing exploits or diminishing returns?<br><a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/ExploitDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExploitDevelopment</span></a></p>
ronin-rb<p>ronin-exploits 1.0.6 and 1.1.0.rc2 have been released.<br><a href="https://ronin-rb.dev/blog/2024/06/28/ronin-exploits-1.0.6-and-1-1-0-rc2-released.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ronin-rb.dev/blog/2024/06/28/r</span><span class="invisible">onin-exploits-1.0.6-and-1-1-0-rc2-released.html</span></a><br><a href="https://infosec.exchange/tags/ronin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ronin</span></a> <a href="https://infosec.exchange/tags/roninrb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>roninrb</span></a> <a href="https://infosec.exchange/tags/ruby" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ruby</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/securitytools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitytools</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
postmodern<p>How useful would you say a command injection payload that exfils a single file via <code>curl</code> to a webserver might be? Do you think it should be built-in to a framework or offered as a 3rd-party thing?<br><a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>payloads</span></a></p>
postmodern<p>For a tool that compiles C payloads, how would you prefer to specify the cross-compiler?<br><a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>payloads</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a></p>
postmodern<p>What is a good example vulnerability that I could use to write a "How To Write An Exploit" style tutorial?<br><a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/xdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xdev</span></a> <a href="https://infosec.exchange/tags/vulndev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulndev</span></a></p>
Ringzer0<p>Finding deserialization bugs in Solarwinds: <a href="https://www.zerodayinitiative.com/blog/2023/9/21/finding-deserialization-bugs-in-the-solarwind-platform" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zerodayinitiative.com/blog/202</span><span class="invisible">3/9/21/finding-deserialization-bugs-in-the-solarwind-platform</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a></p>
postmodern<p>What is currently missing from <a href="https://github.com/ronin-rb/ronin-exploits#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-exploits</a> and <a href="https://github.com/ronin-rb/ronin-payloads#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-payloads</a> for beginners wanting to learn exploit/payload development? I keep seeing people in InfoSec educational Discord servers recommending Metasploit for beginner exploit-dev. I think Metasploit is way too complicated for beginner exploit-dev and it's exploits/payloads contain way too much messy and unnecessary boilerplate code compared to <a href="https://github.com/ronin-rb/ronin-payloads#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-payloads</a>/<a href="https://github.com/ronin-rb/ronin-exploits#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-exploits</a>. Metasploit is clearly better suited for exploiting old CVEs and learning how to pentest a Windows environment, due to it's corpus of exploits and meterpreter. I really think <a href="https://github.com/ronin-rb/ronin-exploits#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-exploits</a> and <a href="https://github.com/ronin-rb/ronin-payloads#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-payloads</a>, or even just loading <a href="https://github.com/ronin-rb/ronin-support#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-support</a> into a Ruby script, are much better suited for beginners than Metasploit, but I can't seem to get through to anyone.</p><p>PS: I know about pwntools. I am not asking about pwntools, I'm asking about ronin-exploits and ronin-payloads specifically in this context.<br><a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/xdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xdev</span></a> <a href="https://infosec.exchange/tags/infosectraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosectraining</span></a></p>
ς๏гєɭคภς0๔3г :verified:<p>ONE more chance to take our popular Bootcamp in 2023 anywhere in the world. We’re setting up camp in beautiful Croatia (Zagreb). High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class). Seats are selling fast! What are you waiting for?? <a href="https://deep-conference.com/predeep-bootcamp/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">deep-conference.com/predeep-bo</span><span class="invisible">otcamp/</span></a> &nbsp;<a href="https://infosec.exchange/tags/corelan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>corelan</span></a> <a href="https://infosec.exchange/tags/windows11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows11</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a></p>
sk3w<p>Here is my writeup for CVE-2023-28244, if you are interested in that sort of thing: <a href="https://terrapinlabs.io/posts/cve-2023-28244/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">terrapinlabs.io/posts/cve-2023</span><span class="invisible">-28244/</span></a></p><p><a href="https://infosec.exchange/tags/ExploitDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExploitDev</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CVE_2023_28244" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE_2023_28244</span></a> <a href="https://infosec.exchange/tags/kerberos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kerberos</span></a></p>
ronin-rb<p>Ever wondered how to port an existing Metasploit exploit to <a href="https://github.com/ronin-rb/ronin-exploits#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-exploits</a>? Well, we now have a guide for that!<br><a href="https://ronin-rb.dev/blog/2023/05/31/new-guide-porting-metasploit-exploits-to-ronin-exploits.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ronin-rb.dev/blog/2023/05/31/n</span><span class="invisible">ew-guide-porting-metasploit-exploits-to-ronin-exploits.html</span></a><br><a href="https://infosec.exchange/tags/ronin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ronin</span></a> <a href="https://infosec.exchange/tags/metasploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>metasploit</span></a> <a href="https://infosec.exchange/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/ruby" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ruby</span></a></p>
Ringzer0<p>📢 Don’t forget to sign up for one of our advanced hands-on <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> trainings! The first week of <a href="https://infosec.exchange/tags/RETURN23XPLOIT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RETURN23XPLOIT</span></a> is only a few days away. Our trainings offer hands-on instruction from top industry experts. In week 1, learn <a href="https://infosec.exchange/tags/Diffing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Diffing</span></a>, <a href="https://infosec.exchange/tags/ExploitDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExploitDev</span></a>, <a href="https://infosec.exchange/tags/ARM64" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARM64</span></a>, <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a>, <a href="https://infosec.exchange/tags/IDAPro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IDAPro</span></a> &amp; more. Don't miss out!</p><p><a href="https://ringzer0.training/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">ringzer0.training/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/training" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>training</span></a></p>
Ringzer0<p>Level up your <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> skills with <a href="https://infosec.exchange/tags/RETURN23XPLOIT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RETURN23XPLOIT</span></a>! Our trainings offer hands-on instruction from top industry experts. In week 1, learn <a href="https://infosec.exchange/tags/Diffing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Diffing</span></a>, <a href="https://infosec.exchange/tags/ExploitDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExploitDev</span></a>, <a href="https://infosec.exchange/tags/ARM64" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARM64</span></a>, <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a>, <a href="https://infosec.exchange/tags/IDAPro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IDAPro</span></a> &amp; more. Don't miss out!</p><p><a href="https://ringzer0.training/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">ringzer0.training/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/training" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>training</span></a></p>
Rairii<p>I don't think I posted one here yet, so:</p><p><a href="https://haqueers.com/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> <a href="https://haqueers.com/tags/introductions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introductions</span></a> </p><p>I'm into <a href="https://haqueers.com/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> - I've done application/bootloader/embedded <a href="https://haqueers.com/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> / <a href="https://haqueers.com/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> but also know my way around <a href="https://haqueers.com/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> and <a href="https://haqueers.com/tags/websec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websec</span></a> and <a href="https://haqueers.com/tags/ExploitDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExploitDev</span></a> :)</p><p>I like <a href="https://haqueers.com/tags/SoftwarePreservation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwarePreservation</span></a> (keep copying those floppies and dumping all the rare media!)</p><p>I like <a href="https://haqueers.com/tags/gameing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gameing</span></a> <a href="https://haqueers.com/tags/gaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gaming</span></a> but haven't really played anything that much recently. Historically I've enjoyed <a href="https://haqueers.com/tags/pokemon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pokemon</span></a> (I have a wood carving of blaziken on my wall!) <a href="https://haqueers.com/tags/mario" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mario</span></a> <a href="https://haqueers.com/tags/metroid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>metroid</span></a> <a href="https://haqueers.com/tags/halo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>halo</span></a> <a href="https://haqueers.com/tags/fifa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fifa</span></a> - I prefer using console because I prefer to work on my PC and big games take up so much disk space these days! (Not to mention I've heard about lots of invasive anti-cheat that flags just having typical reversing tools open!)</p><p>I don't like cats, I prefer <a href="https://haqueers.com/tags/dogs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dogs</span></a> :)</p><p>I like watching sports sometimes - association <a href="https://haqueers.com/tags/football" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>football</span></a>, <a href="https://haqueers.com/tags/tennis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tennis</span></a>, <a href="https://haqueers.com/tags/snooker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snooker</span></a> mainly.</p>
postmodern<p>Does anyone have an example of an exploit that sends multiple HTTP requests to two different hosts? Has that edge-case ever occurred or does every HTTP based exploit target a single host?<br><a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a></p>
postmodern<p>How should XSS exploits be printed out?<br><a href="https://infosec.exchange/tags/xss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xss</span></a> <a href="https://infosec.exchange/tags/poll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poll</span></a> <a href="https://infosec.exchange/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a> <a href="https://infosec.exchange/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a></p>
postmodern<p>Legacy exploit dev question: when generating NOP padding for shellcode, how do you think about it? Especially relevant for RISC architectures where the NOP instruction is more than one byte.<br><a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/oldsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oldsec</span></a></p>