FileMaker Server Admin Console: Access and Role Restriction Issues
Description of the issues I found in the implementation of various Admin Console restriction settings
Description of the issues I found in the implementation of various Admin Console restriction settings
An exploration of the fmp12 file format and account and password storage
Let’s say you have a (Windows or Linux) EC2 instance in a private subnet and want to access it interactively. There are several ways to do this.
A description of how FileMaker Server stores secrets and how to approach deciphering an unknown keystore.
Say you want to allow a non-root user on Linux to execute a couple of scripts as root or another user with more privileges. A common way of doing this is to ...
Currently, there’s a lot of hype around the behavior of Python’s tarfile module for extracting archives. In short: tarfile will not sanitize filenames in arc...
I recently came across an nginx server that had a vulnerable alias configuration which allowed anyone to read files outside the intended directory. In the fo...
Regular expressions are often used to check if a user input should be allowed for a specific action or lead to an error as it might be malicious.
Writing data to the output buffer before deciding that the response to the current HTTP request should actually be a redirect (for example when an unauthenti...
Description of a XXE vulnerability in the Claris FileMaker Platform
A couple of days ago I took the exam for the CRTP certification by Pentester Academy. In this review I want to give a quick overview of the course contents, ...
Write-up of “Buff” from Hack The Box
Write-up of “Tabby” from Hack The Box
Write-up of “Fuse” from Hack The Box
To boot Linux without Data Execution Prevention, so that the OS doesn’t mark certain memory regions as non-executable, we…
How unpickling untrusted data can lead to remote code execution.
Write-up of “Bart” from Hack The Box
Write-up of “Kotarak” from Hack The Box
Write-up of “TartarSauce” from Hack The Box
Write-up of “Cronos” from Hack The Box
Write-up of “Netmon” from Hack The Box
Using the Invoke-Command Cmlet, you can execute a script block in the security context of a different user.
Write-up of “Networked” from Hack The Box
Write-up of “Jerry” from Hack The Box
If you want to debug/inspect/analyze SSL/TLS traffic made by curl, you can easily do so by setting the environment variable SSLKEYLOGFILE to a file path of y...
Pivot by setting up a portproxy between your machine and a machine in another network using “netsh interface portproxy add v4tov4 listenport= connectport= co...
Setting up a DNS tunnel and SOCKS proxy to send/receive data via restricted networks.
Have you ever wondered how a file in a file listing is shown with size 0 bytes but can still contain data? Or maybe wondered where all that meta data is stor...