If you ever record your screen at work, you’ll find yourself navigating the cursor most of the time when programming/writing, instead of typing. Therefore, the lesser time to move the cursor means more time for typing/thinking!
Luckily, using Karabiner with a configuration inspired by UHK (Ultimate Hacking Keyboard) and a faster keyboard repeat rate, your cursor can fly anywhere you want it to be, in real-time.
Before we jump in, let’s see what MacOS has to offer.
In 2019, I discovered multiple vulnerabilities in QNAP PhotoStation and CGI programs. These vulnerabilities can be chained into a pre-auth root RCE. All QNAP NAS models are vulnerable, and there are ~312K vulnerable QNAS NAS instances on the Internet (statistical prediction). These vulnerabilities have been responsibly reported, fixed and assigned CVE-2019–7192 (CVSS 9.8), CVE-2019–7193 (CVSS 9.8), CVE-2019–7194 (CVSS 9.8), CVE-2019–7195 (CVSS 9.8). This article is the first public disclosure, but only 3 of the vulnerabilities are disclosed, because they’re enough to achieve pre-auth root RCE.
Shells like bash, zsh come with many great features to save repeated typing, but most of them are buried in those informative, yet lengthy man pages. This article demonstrates some of the most time-saving features and commands that I heavily use every day.
NOTE: The demonstrations are made in bash, but most of them are applicable in zsh as well.
If the following scenario already makes sense to you, then you don’t need to read this article. Otherwise, I bet this article will help you save a lot of precious time if you use terminal every day as I do.
I passed my OSCP exam, and I rooted all 5 exam machines in 11 hours and 4 minutes (excluding rest time). In the lab, I exploited 46 machines (40 rooted, 6 user). This article is to share:
I have very little pentest experience before PWK, but I’ve been working in the cybersec industry as blueteam for almost 6 years, and I have reported several CVEs (mostly RCEs). …
I discovered a file inclusion vulnerability in
index.php from PMA 4.8.0 ~ 4.8.1, and it is assigned CVE-2018–12613. It is caused by a validation bypass in the vulnerable path checking function
Core::checkPageValidity. This vulnerability enables an authenticated remote attacker to execute arbitrary PHP code on the server.
There is a file inclusion in
if (! empty($_REQUEST['target'])
&& ! preg_match('/^index/', $_REQUEST['target'])
&& ! in_array($_REQUEST['target'], $target_blacklist)
include used to be properly protected by the conditions in the
if statement, but in the 4.8.0 release, the last check is…
Into programming, bug hunting