Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Wealot

TRACE method returns GET

Posted on October 24, 2018 by Wealot

XST is a well known vulnerability and the reason that everyone always alerts: TRACE is allowed this is bad. But what I see often at clients is that a request using TRACE returns the same as a GET. Am I doing something wrong, … Continue reading TRACE method returns GET→

Posted in HTTP

Vulnserver windows 10 only a few exploits

Posted on October 1, 2018 by Wealot

I am playing around with vulnserver on my windows 10 (up to date) host. The weird thing is I only get crashes with KSTET and GTER and nothing with the other ones.

As I found this weird I cheated a bit and searched for other … Continue reading Vulnserver windows 10 only a few exploits→

Posted in exploit-development, professional-education

DVWA file upload High without other vulnerabilities

Posted on September 12, 2018 by Wealot

I am busy with making a comprehensive writeup of DVWA for our junior employees. The high level of the file upload I do not seem to get to work except if I use the file include vulnerability and upload a image with php script … Continue reading DVWA file upload High without other vulnerabilities→

Posted in dvwa, PHP, Vulnerability

Is it possible to find a buffer overflow in WordPress?

Posted on February 8, 2018 by Wealot

I had an interesting conversation with a pentester who told me he had found a buffer overflow in Wordpress. The person in question was really adamant that this was true. The client is a bit skeptical about the technical skill… Continue reading Is it possible to find a buffer overflow in WordPress?→

Posted in buffer overflow, PHP, wordpress

File upload not checking on mime type

Posted on November 14, 2017 by Wealot

So, I have an upload functionality where extension of the filetype is checked correctly (and not currently bypassable). But the mime type is not checked. Does this leave me with some residual risk or possible “attacks”. Where I mean attack… Continue reading File upload not checking on mime type→

Posted in file-upload, mime-type

How to deal with Office documents in file upload?

Posted on November 14, 2017 by Wealot

When creating or testing a file upload functionality how do you deal with Office documents assuming that the client wants to be able to upload .doc/.docx/.xls/.xlsx?

I have found quite some reading material about the possibi… Continue reading How to deal with Office documents in file upload?→

Posted in file-upload, Office

Finding DKIM selectors without mailing

Posted on October 25, 2017 by Wealot

Is there any way to find out what selectors are used by a domain in their DKIM record without access to an e-mail send from that domain?

So to clarify, let’s say I know example.com has DKIM implemented.
I cannot receive an e-mail from exa… Continue reading Finding DKIM selectors without mailing→

Posted in dkim, email

DMARC none policy overwrites local policy

Posted on October 25, 2017 by Wealot

DMARC is used to tell receivers of e-mail what to do if SPF or DKIM fails in mails send from your domain. As far as I know this pretty much sums up DMARC, if this is not correct please correct me.

My question:
The situation … Continue reading DMARC none policy overwrites local policy→

Posted in DMARC, email

Logjam definition question

Posted on July 3, 2017 by Wealot

As I understand it, the Logjam TLS attack is an attack that downgrades the DHE cipher suite used by the server to DHE_EXPORT. Where the client thinks it is talking DHE 512 and the server things it’s talking DHE_EXPORT (which … Continue reading Logjam definition question→

Posted in diffie-hellman, logjam, TLS

DLL hijacking – How to find out if path is relative

Posted on May 29, 2017 by Wealot

I am playing around with dll-hijacking and was wondering about something that I haven’t been able to find out myself by googling.
I get how the basics work with the fact that DLL’s are loaded by an executeable/service/install… Continue reading DLL hijacking – How to find out if path is relative→

Posted in privilege escalation, Vulnerability

Post navigation

← Older posts

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Qilin’s 2024 attack on NHS vendor continues to impact patient care for one NHS Trust April 19, 2026
  • Can the ‘Attention Liberation Movement’ Foment a Rebellion Against Screens? April 19, 2026
  • DIY UPS Keeps Home Assistant Running April 19, 2026
  • Why I’m recommending last year’s phones over 2026 models – with one exception April 19, 2026
  • This powerful Gemini setting made my AI results way more personal and accurate April 19, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up