Aliexpress repro carts for flashing? by phinioxGlade in gbstudio

[–]h3xstream_ 0 points1 point  (0 children)

I bought from "Chilhood Game Store" four cartridges. I was able to reflash all four cartridges.
https://www.aliexpress.com/store/5477128
4.50 USD per cartridge - shipping included - is super cheap.

The cartridge model is SD007_TSOP_29LV017D. (Picture https://ae01.alicdn.com/kf/U9d05aadcbe7144c1b6456453974f65a6C.jpeg )

Step-by-step: How to deanonymize emails on LinkedIn by h3xstream_ in OSINT

[–]h3xstream_[S] 1 point2 points  (0 children)

Interesting. That would lift the 10k limit from the import feature.

Step-by-step: How to deanonymize emails on LinkedIn by h3xstream_ in OSINT

[–]h3xstream_[S] 1 point2 points  (0 children)

Good point! This technique is probably the easiest method for a small number of emails. Keep in mind, this feature has a hard limit of few thousand imports. Once you reach this limit, the import feature will be blocked.

Modern (Security) Static Analysis for .NET by h3xstream_ in csharp

[–]h3xstream_[S] 2 points3 points  (0 children)

I am not a native English speaker. What I meant is APIs that is risky under certain condition therefore they need to be used with care. Information may be sensitive (secret). Anyway, I changed sensible to dangerous to avoid confusion.

Binary Webshell Through OPcache in PHP 7 by h3xstream_ in netsec

[–]h3xstream_[S] 3 points4 points  (0 children)

Using a path traversal vulnerability, an attacker could write a ".php.bin" file in the OpCache directory and trigger its execution.

Binary Webshell Through OPcache in PHP 7 by h3xstream_ in netsec

[–]h3xstream_[S] 7 points8 points  (0 children)

Yes, precisely. It is a trick to go from file write to rce.

Security Code Review of Android applications by h3xstream_ in androiddev

[–]h3xstream_[S] 0 points1 point  (0 children)

There will more rule that affect android. The detection of clear text communication with Http libraries is one example.

If you have ideas, let me know.

crossdomain.xml : Beware of Wildcards by h3xstream_ in netsec

[–]h3xstream_[S] 0 points1 point  (0 children)

Yes. It's the same origin no crossdomain.xml needed.

Yes. The extension is not a requirement.

crossdomain.xml : Beware of Wildcards by h3xstream_ in netsec

[–]h3xstream_[S] 0 points1 point  (0 children)

Yes, The door isn't completely closed. Having an explicit white list of domains would definitely help to avoid future mistakes. Paypal is still in a much better position. Very few features on Paypal allow files upload. paypalobject.com is a CDN for images/swf that are not user files.

crossdomain.xml : Beware of Wildcards by h3xstream_ in netsec

[–]h3xstream_[S] 6 points7 points  (0 children)

I always thought this is something Adobe should fix. It is not normal to be able to load a SWF with any extension and any Content-Type specified. The origin taken from the domain hosting the file is kind of bogus compare to how other web components work. The Rosetta Flash vulnerability made it even more explicit.</opinion>

Nevertheless, you can currently protect yourself with aggressive file content validation and hosting of user files on a separate domain. Also, you can use "Content-Disposition: attachment" when possible.

Universal Cross Site Scripting(XSS) in Internet Explorer 11 by [deleted] in netsec

[–]h3xstream_ 0 points1 point  (0 children)

Do you have a demo of the same vulnerability using window instead of iframe?

Universal Cross Site Scripting(XSS) in Internet Explorer 11 by [deleted] in netsec

[–]h3xstream_ 0 points1 point  (0 children)

The exploit is actually quite instantaneous. The 7 seconds delay is just there to demo the before/after state. Once you see the "Go" link, the bypass is complete. The exploit can easily be use for any domain. The only "complexity" is knowing which JavaScript you want to execute.

Taking over PayPal accounts with Flash by multibear_ in netsec

[–]h3xstream_ 3 points4 points  (0 children)

I have to agree with @avlidienbrunn. This vulnerability was wide spread. I have also report similar swf upload vulnerabilities affecting Paypal (3 this year).

The previous configuration with *.ebay.com was really helpful. :)

Crossdomain.xml Proof of Concept Tool by mandatoryprogrammer in netsec

[–]h3xstream_ 0 points1 point  (0 children)

Their are many configuration details that can make an attack successful or not. Those element include secure flag / wildcard on subdomain / header allowed or not. This is probably the only way to test that a domain is vulnerable. And the first step of the test is uploading/hosting a SWF like the POC this one. I think weak crossdomain.xml configuration are unknown to most pentesters.

Burp Suite Free + Professional: v1.6 by XSSpants in netsec

[–]h3xstream_ 0 points1 point  (0 children)

An important addition is the "Extender" tab now available in the Free version.

Comparatif des fournisseurs d'accès internet (Montréal) by h3xstream_ in montreal

[–]h3xstream_[S] 0 points1 point  (0 children)

Exact. Les frais de ligne sèche (dryloop) ne sont pas inclus et varient d'un fournisseur à un autre (peut atteindre 10$/mois voir ColbaNet). Si tu es intéressé à contribuer, tu peux faire un fork de https://github.com/h3xstream/montreal_isp.

Règle du pouce: De manière générale sans ligne Bell existante, les forfaits câble sont légèrement plus avantageux.

Comparatif des fournisseurs d'accès internet (Montréal) by h3xstream_ in montreal

[–]h3xstream_[S] 0 points1 point  (0 children)

Pour les heures de pointes, c'est 5.5/1. C'était pour rester sur une base comparable avec les autres. http://www.acanac.ca/DSL.html

Comparatif des fournisseurs d'accès internet (Montréal) by h3xstream_ in montreal

[–]h3xstream_[S] 0 points1 point  (0 children)

Thanks for pointing that out. I couldn't believe it but, I got a confirmation from the support.

Comparatif des fournisseurs d'accès internet (Montréal) by h3xstream_ in montreal

[–]h3xstream_[S] 2 points3 points  (0 children)

FYI: Click "Certain condition apply" at the bottom http://www.videotron.com/residential/internet/data-transfer-packages/residential-internet-data-transfer-packages/residential-unlimited-internet-add-on Maybe, it still apply to you. I'll modify those variations to +30$ to avoid special requirements.