April 18, 2023, 10:06 a.m. | Josewice7

System Weakness - Medium systemweakness.com

Hey, I am W1C3, and today I will explain how, through chained vulnerabilities, we were able to achieve Remote Code Execution (RCE). In this challenge, we first used brute force techniques to discover directories that were previously unknown. Once we gained access to the “Browser” directory, we were able to send requests to the server’s internal network, which led us to the endpoint that was currently in development. We then performed fuzzing on the parameter used by the server to …

access browser brute challenge code code execution cybersecurity development directory discover display endpoint exploiting fuzzing hey internal internal network network parameter rce remote code remote code execution requests send server ssrf ssti techniques text the web vulnerabilities walkthrough web

G230ISSO2 - Mid Level Information System Security Officer - Cleared

@ NiSUS Technologies | Annapolis Junction, Maryland, United States

Security Incident Response Engineer

@ Oracle | JALISCO, Mexico

Security Compliance Specialist

@ Cloudflare, Inc. | Hybrid or Remote

Senior Security DevOps

@ SAP | Sofia, BG, 1407

Senior Cyber Security Engineer

@ Node.Digital | Dulles, Virginia, United States

Manager, Data Insights and Forensics

@ Kroll | New York City, United States