From 61e2eb235014e8967ca5d7a9b96b4dc282ae5459 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Tue, 26 Mar 2024 15:56:40 +0100 Subject: [PATCH] a --- .../file-data-carving-recovery-tools.md | 4 ++-- generic-methodologies-and-resources/exfiltration.md | 4 ++-- .../external-recon-methodology/wide-source-code-search.md | 4 ++-- .../python/bypass-python-sandboxes/README.md | 4 ++-- generic-methodologies-and-resources/shells/linux.md | 4 ++-- generic-methodologies-and-resources/shells/windows.md | 4 ++-- .../tunneling-and-port-forwarding.md | 4 ++-- linux-hardening/linux-environment-variables.md | 4 ++-- .../android-app-pentesting/android-applications-basics.md | 4 ++-- .../android-app-pentesting/android-task-hijacking.md | 4 ++-- .../android-app-pentesting/make-apk-accept-ca-certificate.md | 4 ++-- mobile-pentesting/android-checklist.md | 4 ++-- mobile-pentesting/ios-pentesting-checklist.md | 4 ++-- network-services-pentesting/43-pentesting-whois.md | 4 ++-- network-services-pentesting/49-pentesting-tacacs+.md | 4 ++-- network-services-pentesting/7-tcp-udp-pentesting-echo.md | 4 ++-- network-services-pentesting/ipsec-ike-vpn-pentesting.md | 4 ++-- network-services-pentesting/pentesting-ftp/README.md | 4 ++-- .../pentesting-ftp/ftp-bounce-attack.md | 4 ++-- network-services-pentesting/pentesting-imap.md | 4 ++-- .../pentesting-mssql-microsoft-sql-server/README.md | 4 ++-- network-services-pentesting/pentesting-pop.md | 4 ++-- .../pentesting-smb/rpcclient-enumeration.md | 4 ++-- .../pentesting-web/php-tricks-esp/php-ssrf.md | 4 ++-- network-services-pentesting/pentesting-web/tomcat.md | 4 ++-- .../pentesting-web/tomcat/basic-tomcat-info.md | 4 ++-- pentesting-web/bypass-payment-process.md | 4 ++-- pentesting-web/formula-csv-doc-latex-ghostscript-injection.md | 4 ++-- pentesting-web/h2c-smuggling.md | 4 ++-- pentesting-web/hacking-with-cookies/README.md | 4 ++-- pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md | 4 ++-- .../ssrf-server-side-request-forgery/url-format-bypass.md | 4 ++-- pentesting-web/xs-search/css-injection/README.md | 4 ++-- .../xss-cross-site-scripting/abusing-service-workers.md | 4 ++-- reversing/common-api-used-in-malware.md | 4 ++-- reversing/reversing-tools-basic-methods/README.md | 4 ++-- stego/stego-tricks.md | 4 ++-- todo/radio-hacking/flipper-zero/README.md | 4 ++-- todo/radio-hacking/flipper-zero/fz-sub-ghz.md | 4 ++-- todo/radio-hacking/proxmark-3.md | 4 ++-- windows-hardening/checklist-windows-privilege-escalation.md | 4 ++-- windows-hardening/lateral-movement/dcom-exec.md | 4 ++-- 42 files changed, 84 insertions(+), 84 deletions(-) diff --git a/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md b/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md index ef5ad9ce6..62e238642 100644 --- a/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md +++ b/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -114,7 +114,7 @@ You can use the linux command line tool **pdftotext** to transform a pdf into te **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/generic-methodologies-and-resources/exfiltration.md b/generic-methodologies-and-resources/exfiltration.md index 9051fe136..e1f2fd31a 100644 --- a/generic-methodologies-and-resources/exfiltration.md +++ b/generic-methodologies-and-resources/exfiltration.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -386,7 +386,7 @@ Then copy-paste the text into the windows-shell and a file called nc.exe will be **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md b/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md index 7f80ae2d4..37f7de065 100644 --- a/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md +++ b/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -38,7 +38,7 @@ When you look for leaks in a repo and run something like `git log -p` don't forg **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md b/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md index 442eed46f..53ee132b9 100644 --- a/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md +++ b/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -1127,7 +1127,7 @@ will be bypassed **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/generic-methodologies-and-resources/shells/linux.md b/generic-methodologies-and-resources/shells/linux.md index 03caeb114..7f38e3c8f 100644 --- a/generic-methodologies-and-resources/shells/linux.md +++ b/generic-methodologies-and-resources/shells/linux.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -400,7 +400,7 @@ Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/generic-methodologies-and-resources/shells/windows.md b/generic-methodologies-and-resources/shells/windows.md index aa2297346..ae9be4d66 100644 --- a/generic-methodologies-and-resources/shells/windows.md +++ b/generic-methodologies-and-resources/shells/windows.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -572,7 +572,7 @@ WinPWN](https://github.com/SecureThisShit/WinPwn) PS console with some offensive ​ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/generic-methodologies-and-resources/tunneling-and-port-forwarding.md b/generic-methodologies-and-resources/tunneling-and-port-forwarding.md index f92548b30..5837ef273 100644 --- a/generic-methodologies-and-resources/tunneling-and-port-forwarding.md +++ b/generic-methodologies-and-resources/tunneling-and-port-forwarding.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -621,7 +621,7 @@ tunnels: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/linux-hardening/linux-environment-variables.md b/linux-hardening/linux-environment-variables.md index df5f54685..ed3c56319 100644 --- a/linux-hardening/linux-environment-variables.md +++ b/linux-hardening/linux-environment-variables.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -143,7 +143,7 @@ One background job, one stopped and last command didn't finish correctly: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/mobile-pentesting/android-app-pentesting/android-applications-basics.md b/mobile-pentesting/android-app-pentesting/android-applications-basics.md index 18e98dc72..2f61a205a 100644 --- a/mobile-pentesting/android-app-pentesting/android-applications-basics.md +++ b/mobile-pentesting/android-app-pentesting/android-applications-basics.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -417,7 +417,7 @@ if (dpm.isAdminActive(adminComponent)) { **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/mobile-pentesting/android-app-pentesting/android-task-hijacking.md b/mobile-pentesting/android-app-pentesting/android-task-hijacking.md index 6e807fe8d..2bf5e7e91 100644 --- a/mobile-pentesting/android-app-pentesting/android-task-hijacking.md +++ b/mobile-pentesting/android-app-pentesting/android-task-hijacking.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -66,7 +66,7 @@ To prevent such attacks, developers can set `taskAffinity` to an empty string an **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md b/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md index 5e4820e8b..0d25587fd 100644 --- a/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md +++ b/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -71,7 +71,7 @@ Finally, you need just to **sign the new application**. [Read this section of th **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/mobile-pentesting/android-checklist.md b/mobile-pentesting/android-checklist.md index 791130ff5..8c89c8517 100644 --- a/mobile-pentesting/android-checklist.md +++ b/mobile-pentesting/android-checklist.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -77,7 +77,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/mobile-pentesting/ios-pentesting-checklist.md b/mobile-pentesting/ios-pentesting-checklist.md index b22199582..b6413bd9b 100644 --- a/mobile-pentesting/ios-pentesting-checklist.md +++ b/mobile-pentesting/ios-pentesting-checklist.md @@ -24,7 +24,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -120,7 +120,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/43-pentesting-whois.md b/network-services-pentesting/43-pentesting-whois.md index 82582673b..ebf909d07 100644 --- a/network-services-pentesting/43-pentesting-whois.md +++ b/network-services-pentesting/43-pentesting-whois.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -54,7 +54,7 @@ Also, the WHOIS service always needs to use a **database** to store and extract **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/49-pentesting-tacacs+.md b/network-services-pentesting/49-pentesting-tacacs+.md index b6f274c9d..14cf1939d 100644 --- a/network-services-pentesting/49-pentesting-tacacs+.md +++ b/network-services-pentesting/49-pentesting-tacacs+.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -62,7 +62,7 @@ By gaining access to the control panel of network equipment using the obtained c **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/7-tcp-udp-pentesting-echo.md b/network-services-pentesting/7-tcp-udp-pentesting-echo.md index d9925968e..01a29b2ac 100644 --- a/network-services-pentesting/7-tcp-udp-pentesting-echo.md +++ b/network-services-pentesting/7-tcp-udp-pentesting-echo.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -58,7 +58,7 @@ Hello echo #This is the response **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/ipsec-ike-vpn-pentesting.md b/network-services-pentesting/ipsec-ike-vpn-pentesting.md index be22f326f..d30114796 100644 --- a/network-services-pentesting/ipsec-ike-vpn-pentesting.md +++ b/network-services-pentesting/ipsec-ike-vpn-pentesting.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -292,7 +292,7 @@ Ensure that actual, secure values are used to replace the placeholders when conf **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-ftp/README.md b/network-services-pentesting/pentesting-ftp/README.md index 7436db2e4..3988e4f61 100644 --- a/network-services-pentesting/pentesting-ftp/README.md +++ b/network-services-pentesting/pentesting-ftp/README.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -247,7 +247,7 @@ The default configuration of vsFTPd can be found in `/etc/vsftpd.conf`. In here, **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md b/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md index 3746b725c..6546669a4 100644 --- a/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md +++ b/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -56,7 +56,7 @@ nmap -v -p 21,22,445,80,443 -b ftp:ftp@10.2.1.5 192.168.0.1/24 #Scan the interna **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-imap.md b/network-services-pentesting/pentesting-imap.md index 3dc0ab0bc..046f98930 100644 --- a/network-services-pentesting/pentesting-imap.md +++ b/network-services-pentesting/pentesting-imap.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -182,7 +182,7 @@ done **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md b/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md index 4c69adca8..1e94c03f0 100644 --- a/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md +++ b/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -541,7 +541,7 @@ You probably will be able to **escalate to Administrator** following one of thes * [https://blog.waynesheffield.com/wayne/archive/2017/08/working-registry-sql-server/](https://blog.waynesheffield.com/wayne/archive/2017/08/working-registry-sql-server/) **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-pop.md b/network-services-pentesting/pentesting-pop.md index c8af53f60..64da393df 100644 --- a/network-services-pentesting/pentesting-pop.md +++ b/network-services-pentesting/pentesting-pop.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -113,7 +113,7 @@ From [https://academy.hackthebox.com/module/112/section/1073](https://academy.ha **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md b/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md index 5397c0042..3769332bd 100644 --- a/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md +++ b/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -105,7 +105,7 @@ To **understand** better how the tools _**samrdump**_ **and** _**rpcdump**_ work **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md b/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md index 801248888..c741041e2 100644 --- a/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md +++ b/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -76,7 +76,7 @@ $file = file_get_contents($url, false, $context); **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-web/tomcat.md b/network-services-pentesting/pentesting-web/tomcat.md index 837250b0e..794ea0235 100644 --- a/network-services-pentesting/pentesting-web/tomcat.md +++ b/network-services-pentesting/pentesting-web/tomcat.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -268,7 +268,7 @@ msf> use post/windows/gather/enum_tomcat **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md b/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md index 74a5e56fd..a17b660f7 100644 --- a/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md +++ b/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -159,7 +159,7 @@ The file shows us what each of the roles `manager-gui`, `manager-script`, `manag **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/pentesting-web/bypass-payment-process.md b/pentesting-web/bypass-payment-process.md index 056d08ac4..cc114b36a 100644 --- a/pentesting-web/bypass-payment-process.md +++ b/pentesting-web/bypass-payment-process.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -54,7 +54,7 @@ If you encounter a parameter that contains a URL, especially one following the p **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md index a910c3341..2d39770d8 100644 --- a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md +++ b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -219,7 +219,7 @@ From [@EdOverflow](https://twitter.com/intigriti/status/1101509684614320130) **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/pentesting-web/h2c-smuggling.md b/pentesting-web/h2c-smuggling.md index 7421fc087..4d2d70c0f 100644 --- a/pentesting-web/h2c-smuggling.md +++ b/pentesting-web/h2c-smuggling.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -115,7 +115,7 @@ Check the labs to test both scenarios in [https://github.com/0ang3el/websocket-s **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/pentesting-web/hacking-with-cookies/README.md b/pentesting-web/hacking-with-cookies/README.md index 78146af9c..a3e114ffa 100644 --- a/pentesting-web/hacking-with-cookies/README.md +++ b/pentesting-web/hacking-with-cookies/README.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -283,7 +283,7 @@ There should be a pattern (with the size of a used block). So, knowing how are a **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md b/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md index 0ac4a1316..7ee4f2f97 100644 --- a/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md +++ b/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -590,7 +590,7 @@ Rancher's metadata can be accessed using: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md b/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md index 8cde1c3c7..9b9cb3719 100644 --- a/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md +++ b/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -227,7 +227,7 @@ image from [https://claroty.com/2022/01/10/blog-research-exploiting-url-parsing- **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/pentesting-web/xs-search/css-injection/README.md b/pentesting-web/xs-search/css-injection/README.md index cc95934b7..faef680b0 100644 --- a/pentesting-web/xs-search/css-injection/README.md +++ b/pentesting-web/xs-search/css-injection/README.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -491,7 +491,7 @@ So, if the font does not match, the response time when visiting the bot is expec **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md b/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md index d8555e35f..3a4288099 100644 --- a/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md +++ b/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md @@ -16,7 +16,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -125,7 +125,7 @@ For an example of this check the reference link. **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/reversing/common-api-used-in-malware.md b/reversing/common-api-used-in-malware.md index d55280618..8d15b52ed 100644 --- a/reversing/common-api-used-in-malware.md +++ b/reversing/common-api-used-in-malware.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -158,7 +158,7 @@ The malware will unmap the legitimate code from memory of the process and load a **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/reversing/reversing-tools-basic-methods/README.md b/reversing/reversing-tools-basic-methods/README.md index 3fc30fe42..c28da46ca 100644 --- a/reversing/reversing-tools-basic-methods/README.md +++ b/reversing/reversing-tools-basic-methods/README.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -427,7 +427,7 @@ So, in this challenge, knowing the values of the buttons, you needed to **press **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/stego/stego-tricks.md b/stego/stego-tricks.md index f7fe3b2b8..8dc6bb69b 100644 --- a/stego/stego-tricks.md +++ b/stego/stego-tricks.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -239,7 +239,7 @@ For translating Braille, the [Branah Braille Translator](https://www.branah.com/ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/todo/radio-hacking/flipper-zero/README.md b/todo/radio-hacking/flipper-zero/README.md index 40384ae9f..723f7d985 100644 --- a/todo/radio-hacking/flipper-zero/README.md +++ b/todo/radio-hacking/flipper-zero/README.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -35,7 +35,7 @@ With [**Flipper Zero**](https://flipperzero.one/) you can: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/todo/radio-hacking/flipper-zero/fz-sub-ghz.md b/todo/radio-hacking/flipper-zero/fz-sub-ghz.md index 5fc668863..3c38c4c30 100644 --- a/todo/radio-hacking/flipper-zero/fz-sub-ghz.md +++ b/todo/radio-hacking/flipper-zero/fz-sub-ghz.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -129,7 +129,7 @@ Get dBms of the saved frequencies **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/todo/radio-hacking/proxmark-3.md b/todo/radio-hacking/proxmark-3.md index 4f1a34a17..d1f041114 100644 --- a/todo/radio-hacking/proxmark-3.md +++ b/todo/radio-hacking/proxmark-3.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -81,7 +81,7 @@ You can create a script to **fuzz tag readers**, so copying the data of a **vali **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/windows-hardening/checklist-windows-privilege-escalation.md b/windows-hardening/checklist-windows-privilege-escalation.md index b04e6a603..5c82ebb32 100644 --- a/windows-hardening/checklist-windows-privilege-escalation.md +++ b/windows-hardening/checklist-windows-privilege-escalation.md @@ -16,7 +16,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -133,7 +133,7 @@ Other ways to support HackTricks: **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} diff --git a/windows-hardening/lateral-movement/dcom-exec.md b/windows-hardening/lateral-movement/dcom-exec.md index adc4c96b4..b5ec59fea 100644 --- a/windows-hardening/lateral-movement/dcom-exec.md +++ b/windows-hardening/lateral-movement/dcom-exec.md @@ -14,7 +14,7 @@ **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %} @@ -136,7 +136,7 @@ SharpLateral.exe reddcom HOSTNAME C:\Users\Administrator\Desktop\malware.exe **Try Hard Security Group** -
+
{% embed url="https://discord.gg/tryhardsecurity" %}