Found a exploit while doing some Social Engineering during a Penetration Testing (Fast-Track) #8836
diegorego514-ship-it
started this conversation in
Show and tell
Replies: 2 comments
-
|
Can you explain more about what this has to do with Ghidra? |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
Look, i have been exploring up the software but i wanted to test and see if i could pick up any vulnerabilities on this software but instead i got my own way of testing out this, however you know that i am not going to be a good penetration tester by using Ghidra, however there are many other things as i could do like implementing new functions. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Describe the bug
A clear and concise description of the bug.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
It just does a penetration testing (fast track) of the thing, it is supposed to get the vulnerability report and it does.
Screenshots
Attachments
socat-mux.sh
Environment (please complete the following information):
Additional context
I have found such vulnerabilities in this during my Penetration Testing Runs and i have found out such exploits into the logs of the screenshot i just sent earlier.
Beta Was this translation helpful? Give feedback.
All reactions