Post with 1 note
Did you realize it?
When i looked at Masato Kinugawa work, i wonder why!
Ok, not all bugs are vuln..not all vulns are exploitable but they are always related.
Are you familiar with “><img src=a onerror=prompt(1)> ? We are not talking bypass webappsec anymore, it’s a browser issue.
So, got JSON-based cross-site scripting with internal server error but after a second vector works like a beauty of Yoona.
Figure out through debug log
WARNING: NS_ENSURE_SUCCESS(rv, BadImage(newImage)) failed with result 0x80540006: file /tmp/mozilla-release/image/src/ImageFactory.cpp, line 190
0x80540006 is NS_IMAGELIB_ERROR_NO_DECODER
nsRefPtr<RasterImage> newImage = new RasterImage(aStatusTracker, aURI);
rv = newImage->Init(aMimeType.get(), aImageFlags);
uint32_t len = GetContentSize(aRequest);
imagelib can’t decode the image and NS error occured,how clever is that!
Believe it can be done with more conditional and exception handling.
Post with 2 notes
This is how to root almost all Android devices, so sad Android fanboy still thinking boot mode is the only one rooting method. My new device Samsung Galaxy Tab 3(SM-T211) which on XDA Developers root process flashing prerooted firmwares http://forum.xda-developers.com/galaxy-tab-3/development-7 WTF
Save your time and keep low risk.
Download Cydia Impactor here http://www.cydiaimpactor.com/
My Linux 64-bit have different libudev symbolic link, little fix
% ln -s /usr/lib64/libudev.so libudev.so.0
Enable USB debugging, plug your device
Start to drop su binary,Wait…
Download Chainfire’s SuperSu on Play Store, update the su binary, done!
Thx to Saurik for great work.
Post with 1 note
After being stuck on Firewall and GPO, finally i can activate winrm without a doubt.
Also a gigabyte confusing WMI via WinRM
It uses WQL for enumeration,basically same with WMI command-line but different approach.
Metasploit + WinRM = backdoor++
P.S : Windows System Administration is hard!
Page 1 of 10