Security Blog

0xb0rn3@blog:~$ ls -la research/

12 posts published
2026 ~7 min read

React2Shell: Modern Web Frameworks as Attack Vectors

CVE-2025-55182 — critical unauthenticated RCE in React Server Components. Prototype pollution meets unsafe server-side deserialization in the Flight protocol, with ~436K exposed Next.js instances.

React/Next.js RCE Proto Pollution
Read More
2026 ~6 min read

CVE-2025-24893: Unauthenticated RCE in XWiki

Remote code execution via the SolrSearch macro — a single HTTP GET request achieves full system compromise through Groovy template injection. No credentials required.

Groovy Injection SolrSearch RCE
Read More
2026 ~8 min read

Mirth Connect RCE: Healthcare Meets Insecure Defaults

Exploiting CVE-2023-43208 — critical authentication bypass in NextGen Healthcare's Mirth Connect integration engine. From version detection to reverse shell on 272K+ exposed instances.

Healthcare Auth Bypass Reverse Shell
Read More
February 2026 ~10 min read

Sudo NSS Library Hijack: From User to Root

Deep dive into Xpl0it — a PoC exploiting sudo's trust model when handling dynamic library loading in chroot environments. How sudo -R + a crafted nsswitch.conf delivers a root shell.

PrivEsc Sudo NSS Hijack
Read More
2026 ~12 min read

Post-Exploitation Part 1: Privilege Escalation

Getting a shell is just a foothold. SUID abuse, kernel exploits (DirtyCow, PwnKit), and sudo misconfigurations that turn a low-priv user into root.

SUID Kernel Sudo
Read More
2026 ~12 min read

Post-Exploitation Part 2: Pivoting

Lateral movement through compromised networks — Living off the Land, SSH tunneling (local + remote port forwarding), SOCKS proxying, and persistence with autossh.

LOLBins SSH Tunneling SOCKS Proxy
Read More
2026 ~10 min read

Detecting Firewalls Before They Detect You

Mapping the control plane during post-exploitation — understanding iptables, nftables, firewalld, and UFW. Automating Linux firewall detection with a custom script.

Firewalls Linux Bash
Read More
2026 ~5 min read

The Death of the Underground Hacking Scene

What happened when exploits went from currency to content? The information trading economy that defined hacker culture collapsed — we gained access but lost something essential.

Hacker Culture History Essay
Read More
November 2025 ~6 min read

GraphQL Introspection: Exposing API Architecture

Found a production GraphQL endpoint with introspection enabled, revealing the complete API schema. How reconnaissance through introspection leads to data disclosure and exploitation vectors.

GraphQL API Security Recon
Read More
August 2025 ~8 min read

Jenkins Exploitation: Script Console RCE

Discovering exposed Jenkins servers with unauthenticated script console access. Command execution, AWS metadata extraction, and establishing persistence through Groovy.

RCE Jenkins Groovy
Read More
August 2025 ~5 min read

CORS Misconfiguration & Data Exfiltration

Identifying and exploiting CORS misconfigurations for unauthorized data access. Building proof-of-concept exploits and understanding the security implications.

Web Security CORS Data Leak
Read More
August 2025 ~4 min read

Unauthorized Cache Purge: DoS via HTTP Methods

Exploiting accessible PURGE HTTP methods without authentication. Clearing website cache to cause performance degradation and denial of service conditions.

Web Security DoS HTTP Methods
Read More