realansgar (9009)'s Avatar

realansgar (9009)

@realansgar.dev

πŸ§‘β€πŸ’» finding flags @fluxfingers.net πŸ” finding bugs @ Cure53 he/him https://realansgar.dev

50
Followers
202
Following
20
Posts
28.02.2024
Joined
Posts Following

Latest posts by realansgar (9009) @realansgar.dev

Preview
Info - Hack.lu CTF 2025 Hack.lu CTF 2025 - Organized by FluxFingers, the CTF team of Ruhr University Bochum

Hack.​lu CTF registration is open! Win great prizes from our sponsors:

🎯 3x @offensivecon.bsky.social tickets by Binary Gecko
πŸ•΅οΈ 6x @burpsuite.bsky.social
πŸ₯· 6x @binary.ninja
πŸ“¦ 80 months HackTheBox VIP+
πŸ’Έ $1000 by Zellic
πŸ‡©πŸ‡ͺ DHM quals

flu.xxx

16.10.2025 10:44 πŸ‘ 3 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Post image

Hej!

We are thrilled to announce Hack.lu CTF 2025 starts on Friday, October 17.

Top teams can win prizes from our sponsors: OffensiveCon, Zellic, PortSwigger, Binary Ninja, and HackTheBox.

All information on flu.xxx

08.10.2025 15:04 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

Unrelated question: Why does it say NO GLYPH at the end of each line when viewing your post in the Bluesky app? I saw this with multiple of your posts already πŸ€”

08.10.2025 01:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Looks like some Linux eBPF vulnerabilities presented at this year's Black Hat are made-up AI slop

www.openwall.com/lists/oss-se...

30.09.2025 15:16 πŸ‘ 82 πŸ” 20 πŸ’¬ 4 πŸ“Œ 7

Last weekend, we took 1st place at #idekCTF and qualified for the #MaltaCTF finals!
Congrats to all the other teams, and thanks to the organizers β€” the CTF was a lot of fun!

05.08.2025 21:19 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

We secured 3rd place at ENOWARS CTF - top team in the DACH region and now qualified for DHM (German Hacking Championship)!
Huge congrats to all participants and thanks to the organizers for an awesome CTF! πŸŽ‰

19.07.2025 21:46 πŸ‘ 9 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

2. should be the issue. I think innerText decides HTML entities, like &lt; to <, which is then assigned to innerHTML.

14.07.2025 05:15 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (3/3) In the last blog of this series, we will focus back on FortiClient and learn how the inner workings of this application work, and what crucial mistake happened that led to us uncovering a local privil...

πŸ”“β« After compromising every endpoint within an organization, our β€œCaught in the FortiNet” blog series comes to an end with one more thing.
Read more about FortiClient's XPC mistake that allows local privilege escalation to root on macOS:

www.sonarsource.com/blog/caught-...

#appsec #security

08.07.2025 15:32 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

Looks fine to me. Is there a pitfall with basename()?

21.05.2025 12:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

"this case has been assessed as low severity and does not meet MSRC’s bar for immediate servicing due to RCE is no longer possible without extensive user interaction (i.e., accepting a save prompt to a location controlled by an attacker)"
We love to see it 🫠

15.05.2025 10:13 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

It's actually free to register with a (burner) email and read the article, you don't have to pay.

05.05.2025 07:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The Signal Clone the Trump Admin Uses Was Hacked TeleMessage, a company that makes a modified version of Signal that archives messages for government agencies, was hacked.

well well well
www.404media.co/the-signal-c...

05.05.2025 00:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Data in Danger: Detecting Cross-Site Scripting in Grafana Learn how SonarQube detected a Cross-Site Scripting (XSS) vulnerability in Grafana, a popular open-source data observability platform.

πŸ“Šβš οΈ Data in danger!

We found an XSS vulnerability in Grafana with the help of SonarQube. Learn about the details in our latest blog post:

www.sonarsource.com/blog/data-in...

#appsec #security #vulnerability

24.04.2025 15:02 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Kiwi Farms - Wikipedia

ErgΓ€nzung zur Kiwi πŸ₯: Es kΓΆnnte eine Anspielung auf das Kiwi Farms Forum sein, welches hauptsΓ€chlich aus extremen, organisierten harassment von trans Personen bestand.
en.m.wikipedia.org/wiki/Kiwi_Fa...

28.03.2025 11:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

And here's the second part of my old JumpServer journey I presented at Insomni'hack24. After getting authenticated last week, this time we're abusing multiple design flaws to get RCE and escape the Docker container on the JumpServer host.

27.03.2025 05:11 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Surveillance contractors not choosing overly edgy sounding company names challenge (impossible)

24.03.2025 13:46 πŸ‘ 12 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Beanies sold out 😫

21.03.2025 18:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I nominate @sonarresearch.bsky.social, now finally on bluesky :)

21.03.2025 00:26 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The Sonar research team just published a blog about my old JumpServer vulns I presented at Insomni'hack24. Check it out for some microservice shenanigans and stay tuned for part two that covers auth->RCE next week.

20.03.2025 16:21 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
SAML roulette: the hacker always wins Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.

portswigger.net/research/sam...

18.03.2025 14:57 πŸ‘ 53 πŸ” 23 πŸ’¬ 0 πŸ“Œ 4

The call expression check looks at the name of the variable, but not the runtime value of the called function, assuming that it is safe if named calc* We can abuse this to call the function constructor directly and not through calcCall which would block it
calcCall(calcPrint.constructor('alert(1)'))

11.03.2025 10:10 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The code tries to shadow all globals with local variables, but uses Object.keys to enumerate over window. Object.keys does not include non-enumerable properties, which includes globalThis. This leaves globalThis intact for us to use

11.03.2025 01:43 πŸ‘ 5 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

You can use globalThis to get access to all globals again and call arbitrary global functions with the help of calcCall. Then just send innerText of the whole site to your server with fetch :)

10.03.2025 22:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Post: Pressing Buttons with Popups (on Twitch, LinkedIn and more) | Jorian Woltjer Combining existing research with my own experiments to create a realistic proof of concept that forces an OAuth authorization with a single key press. Learn the ins and outs of popup blockers and focu...

Inspired by x.com/PaulosYibelo, I thought about what improvements I could make to trick users into pressing buttons that perform sensitive actions. Finding some vulnerable targets along the way!
Read the details in my latest blog post below:
jorianwoltjer.com/blog/p/hacki...

23.02.2025 14:21 πŸ‘ 5 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
'Luften' Is The German Practice We All Should Be Doing In The Winter This ritual may seem counterintuitive, but your well-being will thank you for it.

This calls for Stoßlüften
www.huffpost.com/entry/luften...

13.02.2025 15:58 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Wow, thanks for 2nd place! Didn't expect this, maybe it's my sign to finally write it down in text form and tackle all the follow-up ideas πŸ‘€

06.02.2025 09:18 πŸ‘ 8 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
CCC | 5-Punkte-Plan fΓΌr d(on't)-trust Der Chaos Computer Club ist eine galaktische Gemeinschaft von Lebewesen fΓΌr Informationsfreiheit und TechnikfolgenabschΓ€tzung.

D-Trust mâchte gern von der eigenen Verantwortung für ein großes Datenleck ablenken. Der CCC erklÀrt die Hintergründe und fordert Konsequenzen. (ja, es war mal wieder 1 von uns lol sorry)
www.ccc.de/de/updates/2...

24.01.2025 16:47 πŸ‘ 59 πŸ” 22 πŸ’¬ 4 πŸ“Œ 0
Preview
Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel On November 20, 2024, Shubham Shah and I discovered a security vulnerability in Subaru’s STARLINK admin panel that gave us unrestricted access to all vehicles and customer accounts in the United State...

New blog post with @shubs.io:

We found a vulnerability in Subaru where an attacker, with just a license plate, could retrieve the full location history, unlock, and start vehicles remotely.

Full post here: samcurry.net/hacking-subaru

23.01.2025 17:44 πŸ‘ 73 πŸ” 30 πŸ’¬ 5 πŸ“Œ 7

They only fixed a bug that made it easier to abuse this caching info. The bug was with Cloudflare Workers and allowed to run a Cloudflare Worker at a specific data center. From there, the cache state could be retrieved.

The cache info can still be retrieved now using a VPN close to a CF datacenter

21.01.2025 16:53 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The voting form says that it closes on the first of February? πŸ˜…

21.01.2025 10:52 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0