Kali Linux Long Term Usage Part 3: VirtualBox Guest Additions
This post concludes the series on optimizing Kali Linux in a VirtualBox virtual machine, focusing on resolving slow boot times caused by issues with VirtualBox Guest Additions.
This post concludes the series on optimizing Kali Linux in a VirtualBox virtual machine, focusing on resolving slow boot times caused by issues with VirtualBox Guest Additions.
This post continues the series on optimizing Kali Linux in a virtual machine, focusing on reducing long boot times caused by systemd timeouts, partition issues, and swap space misconfiguration.
This post explores disk usage optimizations for Kali Linux running in a virtual machine, addressing slow boot times and inefficiencies discovered over years of use.
I am a C/C++ newbie, but occassionally I have to compile or build projects. Since make (and Makefiles) are quite prevalent and sometimes they have to be adjusted due to potential errors, I had to learn more about them and want to share my learning publicly here.
First of all, what are the involved building blocks of make and Makefiles?
The general format of a Makefile
is as follows:
After the seminal blog post by James Jardine in 2016 on XXE exploitation in .NET applications back in 2016, Microsoft seems to have implemented some additional changes regarding the default behavior of XML parsers.
We work through the different XML methods provided and their corresponding vulnerable configurations. For all experiments, .NET framework 4.6 was chosen.
In order to create an XXE vulnerability for applications using .NET framework 4.6+, you have to instantiate a vulnerable XmlResolver
beforehand.
In a recent engagement I was confronted with a blind path traversal vulnerability on a server running with the Microsoft Windows operating system. That is, it was not possible to display folder contents but the complete file name and path had to be guessed. Due to the lack of a comprehensive website I was forced to gather information from various different sources.
In this blog post, I want to summarize my findings and focus on the exploitation of this kind of vulnerability.