Post Exploitation in Oracle web logic server 10.35 (Oracle Linux Server 3.8)

Web Server : Oracle WebLogic 10.35
Machine : Oracle Linux Server 3.8
I was able to partially exploit this CVE. I can execute any command on server using HTTP request and redirecting its output to a file i.e
cat /etc/passwd > /tmp/succes… Continue reading Post Exploitation in Oracle web logic server 10.35 (Oracle Linux Server 3.8)

What are the threats of using hashing functions that are built into the DBMS? (besides man-in-the-middle attacks)

There are functions like MD5 and SHA2 in MySQL which can be used to hash values before putting them into the database, or when searching over values.
As I proposed a possible solution in a comment to this answer to a question, I was told t… Continue reading What are the threats of using hashing functions that are built into the DBMS? (besides man-in-the-middle attacks)

Encrypted user data and storing hashed RSA keys on the server for backup reasons

Imagine a mobile app that connects to an API server.
Disclaimer
I’m not sure if RSA is the right technique for this, please feel free to recommend alternatives.
The goal
The backend/database super users should not be able to recognize pers… Continue reading Encrypted user data and storing hashed RSA keys on the server for backup reasons

Is is bad that on-prem "prod" DB is accessible/visible from in-cloud dev environment?

We have our dev & prod env split between AWS (databricks workspaces) and on-prem Linux boxes. Specifically, we have DB instances on-prem and have python code running inside our databricks workspace in AWS that reads/writes to the DB.
W… Continue reading Is is bad that on-prem "prod" DB is accessible/visible from in-cloud dev environment?