• Pentest Report - ECSA
  • Document Details
    • Version History
    • Contact
  • Executive Summary
    • Target Systems
    • Timeline
  • Comprehensive Technical Report
    • Vulnerability Assessment
    • Challenges
      • [Challenge 1:] Network Scanning & Service Enumeration
      • [Challenge 2:] Microsoft Server Service Relative Path Stack Corruption
        • Risk Information
        • References
      • [Challenge 3:] Bash Remote Code Execution
        • Risk Information
        • References
      • [Challenge 4:] Weak Port Hardening
      • [Challenge 5:] freeSSHd SFTP Authentication Bypass vulnerability
        • Risk Information
        • References
      • [Challenge 6:] SQL Injection & XSS Attack
      • [Challenge 7:] Wordpress Plugin - Cross-Site Request Forgery (CSRF)
        • References
      • [Challenge 8:] SMB Psexec Vulnerability
        • Risk Information
        • References
      • [Challenge 9:] SQL Injection Vulnerability
        • Risk Information
        • References
      • [Challenge 10:] MySQL Password Bypass Vulnerability
        • Risk Information
        • References
      • [Challenge 11:] Joomla Media Manager File Upload Vulnerability
        • Risk Information
        • References
Powered by GitBook

References

References

  • https://www.optiv.com/blog/owning-computers-without-shell-access

  • http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx

  • CVE-1999-0504

results matching ""

    No results matching ""