breaching purpose
by DeadlySox - Monday April 8, 2024 at 11:30 PM
#1
I wanna ask a discussion question 
when a website or a company has been breached or their database has been leaked
what are the vulnerabilities that the attackers use to breach the database or website?
I mean the common ones are known and are patched so how do they get breached?
Reply
#2
SQL injection, local/remote file inclusions, sometimes you can chain into a remote code execution situation or just be luck enough to find one straightaway. Finding outdated software + known exploits is another. Weak authentication systems, privilege escalation both horizontally and laterally. General API abuse is becoming more popular.

I'm dev for a project to automatically look through a collection of router firmware images across many manufacturers and models. This would be more in the 0day side of the playpen once it starts working as anticipated. Already found some private keys that are being used for something that it shouldn't be...
Looking for Python WebDev to Help Build a PubNet Site
DM Me Fentanyl Supply Chain Info
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  OSINT repositories by country browdbrowniebread 0 194 Yesterday, 07:41 PM
Last Post: browdbrowniebread
  A collection of deepweb sites [2025] dg7ka 107 2,907 Yesterday, 03:27 PM
Last Post: Jeracix
  FREE 3 UNCENSORED HACKING LLM QaboosbinSaidAlSaid 68 1,647 Yesterday, 02:22 AM
Last Post: Microban
  Telegram Opsec Guide Synaptic 47 1,835 Apr 29, 2026, 07:59 PM
Last Post: thebinarymonk
  Looking for experienced hacker 99992 0 176 Apr 28, 2026, 10:59 PM
Last Post: 99992

Forum Jump:


 Users browsing this forum: 1 Guest(s)