Skip to content

Author: touhid

Suid Binary โ€“ .so Injection(Weak File Permissions)(Privilege Escalation)

Introduction SUID (Set User ID) binaries are executables that run with the privileges of the file owner rather than the user who executed the file. This capability can be advantageous in certain scenarios but can also pose significant security risks, particularly when weak file permissions or improper configurations are present.…

Leave a Comment

PSV-2018-0182: NetGear WNR614 WiFi Home Router Unauthenticated Remote Admin Forcibly Logout

. Introduction NetGear is a well-known name in the networking industry, providing a range of WiFi routers for homes and small businesses. One of the famous models from NetGear is the WNR614 WiFi Home Router. In this article, we’ll look at a vulnerability discovered in the WNR614 router, which allows…

Leave a Comment

(De | Un)serialization Detailed with Demo

Hello Friends, In this post. I am going to cover Deserialization or Unserialization Vulnerability detailed with a Practical Example. Before going in depth of this post. be clear Desirialize and Unserialize is a same this in two different computer programming language. that is Unserialize in PHP and Deserialize in JAVA.…

Leave a Comment