HADESS
Cyber Security Magic
Korenix JETIO 6550 Vulnerabilities

Korenix JETIO 6550 Vulnerabilities EBook

In the realm of network security, vulnerabilities can present significant risks to the integrity and confidentiality of data. CVE-2024-2371, a vulnerability identified within Korenix JetIO, is a prime example of such a threat. Korenix JetIO is a popular industrial Ethernet switch series widely used in critical infrastructure and industrial control systems (ICS). This vulnerability, designated…

Read More
Korenix JETIO 6550 Vulnerabilities

Korenix JETIO 6550 – CVE-2024-2371

CVE-2024-2371 exposes a vulnerability in Korenix JetIO switches, affecting the Simple Network Management Protocol (SNMP) implementation. SNMP, a commonly used protocol for network management, is leveraged by Korenix JetIO switches for administrative tasks. However, the flaw allows unauthorized users to exploit SNMP to access sensitive data within the system. The vulnerability arises due to insufficient…

Read More
Pwning the Domain: Kerberos Delegation

Pwning the Domain: Kerberos Delegation EBook

Kerberos Delegation, a fundamental component of modern network security, facilitates the delegation of authentication rights within networked environments. This article provides an in-depth exploration of Kerberos Delegation, covering its various forms and extensions. We delve into the distinctions between Unconstrained and Constrained delegation, highlighting the security implications of each. Additionally, we examine the role of…

Read More
Web LLM Attacks

Web LLM Attacks EBook

Large Language Models (LLMs) are vulnerable to various forms of attacks, including model chaining prompt injection, where attackers craft a sequence of seemingly benign prompts that collectively lead to the execution of malicious code. By exploiting the LLM’s sequential prompt processing, attackers can manipulate the model into performing unintended actions, highlighting the importance of robust…

Read More
Web LLM Attacks

Web LLM Attacks

The integration of Large Language Models (LLMs) into online platforms presents a double-edged sword, offering enhanced user experiences but also introducing security vulnerabilities. Insecure output handling is a prominent concern, where insufficient validation or sanitization of LLM outputs can lead to a range of exploits like cross-site scripting (XSS) and cross-site request forgery (CSRF). Indirect…

Read More
Pwning the Domain: With Credentials

Pwning the Domain: With Credential EBook

The “Pwning the Domain: With Credentials” article series presents a comprehensive exploration of techniques used by attackers to exploit Active Directory environments. Key findings include the significance of proper enumeration of domain accounts using tools like BloodHound and PowerView, the exploitation of vulnerabilities such as Kerberoasting and coercion techniques like PetitPotam and PrinterBug, which can…

Read More