How a remote control attack on a smartphone using wifi is established [closed]

I took a course last year that says that using wifi on smartphones can lead to a remote control exploit, also I’ve read about some vulnerabilities in wifi chips that allow such an exploit allowing read and write commands.
An example here
h… Continue reading How a remote control attack on a smartphone using wifi is established [closed]

How is the folder structure of Oracle Peoplesoft organized (linux)? [closed]

I found a Oracle Peoplesoft server has CVE-2017-10366 which lead to RCE. But the firewall blocked all outbound traffic except DNS query. So I think I can create a JSP shell and access to it, but I don’t know how the folder structure is org… Continue reading How is the folder structure of Oracle Peoplesoft organized (linux)? [closed]

PHP exploit attempt using User-Agent header: base64 encoded string containing a serialised PHP object [closed]

I encountered a funny User-Agent header that is a Base64 encoded value of a serialised PHP object. It was only by chance that it didn’t fit in the MySQL field where such agents are logged, resulting in an error logged in Sentry.
This is li… Continue reading PHP exploit attempt using User-Agent header: base64 encoded string containing a serialised PHP object [closed]