1337day XSS!

Inj3ct0r

1337day had a reflective XSS bug and a HTML injection vulnerability. Anyhow according to my research done this was a browser dependent XSS meaning this could be only exploited in the Microsoft Internet Explorer browsers  only. By the way I also got mentioned in a blog : http://thehackersbay.org/2013/12/1337day-a-popular-exploit-database-has-been-affected-by-a-xss/

hash_pub pub

Reward was 10 gold. Thanks to r0073r 🙂

Acknowledged by Ifixit

This week I wanted to hunt a bug in Ifixit.com. Well I was little interested in the search bar field. So I taught of fuzzing from there. It had a good filter to filter user input. But to my surprise I ended by bypassing the filter 🙂

My name got published in the Thanks section 😉

http://www.ifixit.com/Info/Responsible_Disclosure#Section_2013

hof

I am sorry that I cannot disclose my vector or any sensitive data from the website. This issue has been already verified and patched.

pub

 

Hmm… wait a sec for my bypassing I should be rewarded right? So here we go , got a nice t-shirt, some stickers and a cool Ifixit toolkit 😉

1492480_10202892524020737_1989531121_o

Thank you guys. This was really impressive.

 

Rooting pWnOS

Heyyo these days I was sick and bored. So taught of taking some adventure in penetration testing. I’ve made a short video on rooting pWnOS. You can download it over here: http://pwnos.com/files/pWnOS_v2.0.7z

[youtube=http://www.youtube.com/watch?v=k1JHGfYackc&feature=youtu.be]

I have explained the complete penetration testing scenario which basically you can understand 🙂

Well as Nessus found out a vulnerability in port 22 which is in the SSH service I basically applied that exploit which is the Debian OpenSSL Predictable PRNG Bruteforce SSH Exploit. Download the keys: http://exploit-db.com/sploits/debian_ssh_rsa_2048_x86.tar.bz2

This is localroot exploit I used: http://www.exploit-db.com/exploits/5092/