June 5, 2022
-
How to exploit the confluence 0day.
-
If you want to have a simple private Tor-alike system, this seems like a good starting place.
UPnProxyChain: a Tool to Exploit Devices Vulnerable to UPnProxy
https://shufflingbytes.com/posts/upnproxychain-a-tool-to-exploit-devices-vulnerable-to-upnproxy/
Code:
https://github.com/ValtteriL/UPnProxyChain
ProTip:
nmap -sU -p 1900 —script=upnp-info <target>
And if you want to fuck with the above:
https://github.com/chadillac/UPnProxyPot
-
In completely unrelated news, for the first time the Russia authorities are saying something in public about the last three months of non stop hacking.
Crypto. Scam. Fraud. (Strong, “and nothing of value was lost” vibe)
-
-
-
-
This is excellent.
-
-
UAV records itself getting shot down.
-
-
-