Get Mystery Box with random crypto!

Hack3rScr0lls

Logo of telegram channel hackerscrolls — Hack3rScr0lls H
Logo of telegram channel hackerscrolls — Hack3rScr0lls
Channel address: @hackerscrolls
Categories: Technologies
Language: English
Country: Not set
Subscribers: 1.81K
Description from channel

for hackers by hackers
twitter.com/hackerscrolls

Ratings & Reviews

1.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

0

2 stars

0

1 stars

2


The latest Messages 2

2020-12-27 21:02:28 We often get confused how Samesite affects cookies in different attacks in modern browsers. So, we have made a memo and now share it with you.

UPD:
Safari blocks third-party cookies (https://webkit.org/blog/10218/full-third-party-cookie-blocking-and-more/), therefore restrictions in cases of "None" and "No attribute" are related to this and not samesite.

But classic CSRF POST form still works

#SameSite #Cookies #CSRF
1.7K viewsedited  18:02
Open / Comment
2020-12-27 21:02:25
1.4K views18:02
Open / Comment
2020-12-12 21:09:15 We have combined all the tricks we know about SSRF into a single mindmap.

XMind source: https://github.com/hackerscrolls/SecurityTips/raw/master/MindMaps/SSRF.xmind

#SSRF #Web
2.0K views18:09
Open / Comment
2020-12-12 21:08:00
1.6K views18:08
Open / Comment
2020-11-07 17:05:44 Tunneling TCP over DNS

DNS tunneling is a Red Team technique that allows transferring data over DNS when a direct TCP/UDP connection is blocked.

There are a lot of tools for data exfiltration or command execution over DNS.

But what if you want to scan the internal network?

Try ThunderDNS from @fbk_cs
> TCP-SOCKS proxy to the target network over DNS tunnel
> Bash/Powershell clients (You don't even need to compile it!)

github.com/fbkcs/ThunderDNS

#RedTeam #DNS
1.9K viewsedited  14:05
Open / Comment
2020-11-07 17:05:08
1.4K views14:05
Open / Comment
2020-11-02 19:38:14 WiFi Hacking MindMap & Cheatsheet by @Xst3nZ

WiFi Cheatsheet
WiFi MindMap PDF

#wifi
1.6K views16:38
Open / Comment
2020-10-24 12:25:53 CSRF in 120 seconds!

As you remember Cookies without SameSite are treated as SameSite=LAX in Chrome. But there is one exception that can be used as a temporary policy bypass.

If Cookies without SameSite is obtained less than 120 seconds ago, then you can CSRF using the typical POST form.

How to exploit it:
Force the victim to re-login and to get fresh cookies, for example with OAuth.
1. window.open('/api/login/oauth') -> auto relogin
2. POST /api/vuln/method -> CSRF attack

Force the victim to log out and redirect to the login page, then wait until the victim is logged in.
1. GET /api/user/logout -> clear session
2. window.open('/login_form') -> wait
3. POST /api/vuln/method -> CSRF attack

More detailed examples by @RenwaX23

#CSRF #SameSite #Cookies
1.8K viewsedited  09:25
Open / Comment
2020-10-24 12:25:27
1.2K views09:25
Open / Comment
2020-10-23 12:19:50 Nice trick to get RCE in Android app using unzip from @_bagipro

Original

Easy arbitrary code execution on Android:

1. Write a hook (using Xposed or Frida) to log paths of File.exists() and mention all files ending with .so during app load

2.1. Grep for ZipFile usage (and all its methods such as entries(), getEntry(...), etc).

2.2. If there's no security checks such as zipFile.getName().contains("../"), it means you can overwrite arbitrary files during unzip. Now find a way to substitute that zip (very often they are stored on SD card, or its path is accepted by some unprotected component)

3. Compile a native library that executes some code (such as writing user id to a file, or performing chmod 777), create a zip with path-traversal in its name and force the app to process it.

Pretty easy technique that brought me tens of thousands in GPSRP!

#Android
1.2K viewsedited  09:19
Open / Comment