nmap

2 articles
sort: new top best
clear filter
0 8/10
bug-bounty

A bug bounty hunter discovered unauthenticated Remote Code Execution via an HTTP PUT method on a staging web service running on a non-standard port, enabling file upload of a PHP web shell. The RCE was leveraged to gain a reverse shell, traverse the internal network using discovered zone transfer files, and achieve lateral movement to other systems using weak credentials embedded in system files.

nmap netcat ncat OPTIONS PUT phpinfo
blog.zsec.uk · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 5/10

A writeup demonstrating how to escalate a banner grabbing reconnaissance finding into critical vulnerabilities (DoS and memory corruption) on IIS servers using MS15-034 (CVE-2015-1635), exploitable via HTTP Range headers and Metasploit modules.

MS15-034 CVE-2015-1635 Daniel Morais IIS Metasploit
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details