Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
I secretly hope that they do that on purpose as a little prize for the people who get past it.
-
lotd79227yPush sqlmap & metasploit on it, going full hail Mary.
Who knows, you might just gets a nice reverse shell..
:p
Disclaimer: I cannot be held responsible nor affiliated with any damage this may cause. -
@lotd why would I need a reverse shell. I won't even touch that server with a ten foot pole. If I found the vulnerability, someone would have found and exploited it too. And God knows what malware or logic bomb that attacker might have planted...
-
lo98be6187yWell.. VPN, VM and a snapshot with Kali and you're good to go
Tor is probably better tough
Same thing as @lotd, this is just for educative purpose, if you do something illegal, don't blame me thanks -
Froot75547y@lo98be There should be an "Illegal shit" lisence for that so you wouldn't have to type it out every time
Disclaimer: If you create this lisence and it doesn't hold and still gets you in trouble then I'm not responsible.
Just found an admin portal online. There was a modal asking for password, but in background the portal was visible. ctrl + shift + i and then closed the modal.
Voila, the whole portal and actions are accessible. Seriously, who develops things like these?
I am pretty sure it's vulnerable to sqli and xss too.
undefined
modal
security my foot
login bypass