The post describes the author's findings while exploiting vulnerabilities in a web application. The author uncovers a hidden input vulnerability, abuse it to elevate privileges, bypass a filter to upload a webshell, trigger a DLL to be loaded, and reverse-engineer a .NET binary. They also explain how to extract an encryption key from the Windows registry.
•32m read time• From 0xdf.gitlab.io
Sort: