Welcome to Ricter's Diary Server. [ ð
]
Source code: https://github.com/RicterZ/shell-blog
$ cat /proc/self/cwd/find_me
Email: [ Ricter Z<[email protected]> ]
Github: [ https://github.com/RicterZ ]
Looking for my old blog posts? Here.
$ id | fold -w 103
uid=1000(ricter) gid=1000(ricter) groups=1000(ricter),1001(hacker),1002(ffxiv),1003(acg)
$ ls -1r posts/
2023-03-19-[password-protected]minio-research-and-exploitation.txt
2022-09-28-[password-protected]geoserver-vulnerability-research.pdf
2022-04-28-a-new-exploit-method-for-cve-2021-3560-polkit-linux-privilege-escalation.txt
2022-04-01-[password-protected]dbus-research-method-and-my-first-linux-privilege-escalation.txt
2022-03-03-a-new-attack-method-ajp-request-smuggling.txt
2022-01-29-[password-protected]ââââââ-remote-code-execution.txt
2022-01-18-[password-protected]a-new-attack-surface-on-ââââââ-ââââââ.txt
2021-11-19-[password-protected]ââââââ-from-cross-site-scripting-to-remote-code-execution.txt
2021-07-31-[password-protected]hacking-with-vmware-tools.txt
2021-07-05-apache-apisix-attack-surface-research.txt
2021-06-05-vsphere-vcenter-server-remote-code-execution.txt
2021-03-02-exploit-.net-viewstate-deserialization-with-isolateapps-modifier.txt
2021-01-02-using-upnp-igd-to-open-backdoor-of-an-intranet.txt
2020-11-11-ntopng-auth-bypass-and-more.txt
2020-06-02-fastjson-tricks.txt
2020-03-19-codeql-extension-library-developing.txt
2020-03-05-exploiting-ffxiv-postnamazu-for-fun.txt
2020-01-03-fantasy-tour-of-ffxiv-phishing-website.html
2019-08-13-http-desync-attacks.txt
2019-07-30-rtmpsrv-path-traversal-and-rce.txt
2019-07-08-two-tricks-of-redis-exploitation.txt
2019-07-05-how-i-accessed-intranet-of-bââââââi.html
2019-03-06-yet-another-way-to-exploit-spring-boot-actuators-via-jolokia.txt
2019-01-30-php-security-measures-bypass.txt
2019-01-25-apache-tapestry-from-path-traversal-to-rce.txt
2019-01-02-nexus3-preauth-el-injection.txt
2018-12-16-opendaylight-authed-rce-via-jolokia.txt
-------------------------------------------------------------------------
* All the contents within the blog is licensed under the CC BY-NC-ND 4.0
-------------------------------------------------------------------------