This commit is contained in:
Swissky 2019-03-04 19:40:34 +01:00
parent e36b15a6d7
commit 450de2c90f
3 changed files with 4 additions and 3 deletions

View File

@ -12,7 +12,7 @@
* [EoP - Windows Subsystem for Linux (WSL)](#eop---windows-subsystem-for-linux-wsl)
* [EoP - Unquoted Service Paths](#eop---unquoted-service-paths)
* [EoP - Kernel Exploitation](#eop---kernel-exploitation)
* [EOP - AlwaysInstallElevated](#eop---alwaysinstallelevated)
* [EoP - AlwaysInstallElevated](#eop---alwaysinstallelevated)
* [EoP - Insecure GUI apps](#eop---insecure-gui-apps)
* [EoP - Runas](#eop---runas)
@ -499,7 +499,7 @@ List of exploits kernel : [https://github.com/SecWiki/windows-kernel-exploits](h
...
- [MS03-026](./MS03-026)  [KB823980]   [Buffer Overrun In RPC Interface]  (/NT/2000/XP/2003)
## EOP - AlwaysInstallElevated
## EoP - AlwaysInstallElevated
Check if these registry values are set to "1".

View File

@ -96,6 +96,7 @@ Bypass localhost with a domain redirecting to locahost
http://localtest.me
http://customer1.app.localhost.my.company.127.0.0.1.nip.io
http://mail.ebc.apple.com redirect to 127.0.0.6 == localhost
http://bugbounty.dod.network redirect to 127.0.0.2 == localhost
```
The service nip.io is awesome for that, it will convert any ip address as a dns.

View File

@ -11,7 +11,7 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall
- [Polyglot XSS](#polyglot-xss)
- [Filter Bypass and Exotic payloads](#filter-bypass-and-exotic-payloads)
- [CSP Bypass](#csp-bypass)
- [Common WAF Bypas](#common-waf-bypass)
- [Common WAF Bypass](#common-waf-bypass)
## Exploit code or POC