How I turned a competition distraction into a 0-day. This writeup covers the discovery and exploitation of CVE-2022-35420, an auth bypass in Scada-LTS that exposes critical industrial control systems to unauthenticated account takeover.
Here’s a fun html-injection vulnerability in one of Stanford University’s websites and how I found it. Screenshot of HTML-injection vulnerability proof of concept:
Announcing my latest developer tool: Source Snapshot – A source code directory visualizer for your browser.
A simple cheatsheet for Solidity Integer ranges, from uint8 to uint256. In data types, size does matter :0.
I recently bought a new DIR-842 home router, and immediately (as any hacker would) started toying with it - I can’t call it mine until I pop a shell on it.
Rather quickly I found I can enable telnet through the admin web gui, and then connect to telnet with an admin user. But that was too easy, so let’s see if we can find a bug/vulnerability.