<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[I Red Team DEV - Hot Topics ]]></title>
		<link>https://ired.dev/</link>
		<description><![CDATA[I Red Team DEV - https://ired.dev]]></description>
		<pubDate>Tue, 05 May 2026 12:15:39 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[XSS]]></title>
			<link>https://ired.dev/showthread.php?tid=54</link>
			<pubDate>Sun, 03 Aug 2025 17:39:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=146">Clara1337</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=54</guid>
			<description><![CDATA[Sir can you give me a suggestion for a payload xss bypas ?]]></description>
			<content:encoded><![CDATA[Sir can you give me a suggestion for a payload xss bypas ?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[CVE-Vulns]]></title>
			<link>https://ired.dev/showthread.php?tid=35</link>
			<pubDate>Sun, 06 Jul 2025 21:06:12 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=35</guid>
			<description><![CDATA[#exploit<br />
1⃣ CVE-2025-48703: (<a href="https://fenrisk.com/rce-centos-webpanel" target="_blank" rel="noopener" class="mycode_url">https://fenrisk.com/rce-centos-webpanel</a>)<br />
RCE in CentOS Web Panel<br />
2⃣ CVE-2025-31200: (<a href="https://blog.noahhw.dev/posts/cve-2025-31200" target="_blank" rel="noopener" class="mycode_url">https://blog.noahhw.dev/posts/cve-2025-31200</a>)<br />
Zero-click RCE vulnerability in Apple's iOS 18.x<br />
3⃣ CVE-2025-32463: (<a href="https://github.com/pr0v3rbs/CVE-2025-32463_chwoot" target="_blank" rel="noopener" class="mycode_url">https://github.com/pr0v3rbs/CVE-2025-32463_chwoot</a>)<br />
Escalation of Privilege to the root through sudo binary with chroot option<br />
4⃣ CVE-2025-49113: (<a href="https://github.com/fearsoff-org/CVE-2025-49113" target="_blank" rel="noopener" class="mycode_url">https://github.com/fearsoff-org/CVE-2025-49113</a>)<br />
Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization<br />
5⃣ CVE-2025-32433: (<a href="https://github.com/ProDefense/CVE-2025-32433" target="_blank" rel="noopener" class="mycode_url">https://github.com/ProDefense/CVE-2025-32433</a>)<br />
Unauth RCE in Erlang/OTP SSH]]></description>
			<content:encoded><![CDATA[#exploit<br />
1⃣ CVE-2025-48703: (<a href="https://fenrisk.com/rce-centos-webpanel" target="_blank" rel="noopener" class="mycode_url">https://fenrisk.com/rce-centos-webpanel</a>)<br />
RCE in CentOS Web Panel<br />
2⃣ CVE-2025-31200: (<a href="https://blog.noahhw.dev/posts/cve-2025-31200" target="_blank" rel="noopener" class="mycode_url">https://blog.noahhw.dev/posts/cve-2025-31200</a>)<br />
Zero-click RCE vulnerability in Apple's iOS 18.x<br />
3⃣ CVE-2025-32463: (<a href="https://github.com/pr0v3rbs/CVE-2025-32463_chwoot" target="_blank" rel="noopener" class="mycode_url">https://github.com/pr0v3rbs/CVE-2025-32463_chwoot</a>)<br />
Escalation of Privilege to the root through sudo binary with chroot option<br />
4⃣ CVE-2025-49113: (<a href="https://github.com/fearsoff-org/CVE-2025-49113" target="_blank" rel="noopener" class="mycode_url">https://github.com/fearsoff-org/CVE-2025-49113</a>)<br />
Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization<br />
5⃣ CVE-2025-32433: (<a href="https://github.com/ProDefense/CVE-2025-32433" target="_blank" rel="noopener" class="mycode_url">https://github.com/ProDefense/CVE-2025-32433</a>)<br />
Unauth RCE in Erlang/OTP SSH]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Poveste: "Mâinile virtuale în spatele ecranului real"]]></title>
			<link>https://ired.dev/showthread.php?tid=11</link>
			<pubDate>Sat, 14 Jun 2025 15:41:08 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=11</guid>
			<description><![CDATA[Real Screen"<br />
(How a Screen Sharing Tool Became a Hacker's Window)<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/t2d/1/16/1f4cd.png" loading="lazy"  width="16" height="16" alt="[Image: 1f4cd.png]" class="mycode_img" />Chapter 1 - Missing Contract<br />
A technology company specializing in software development for a major banking company in the ASEAN region. On the day of the project submission, the client's feedback:<br />
"Unfortunately, your opponent came up with a better pricing package - and, strangely enough, understands the entire architecture you proposed."<br />
This company never shared the architecture with anyone except internally.<br />
I was invited to investigate.<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/t42/1/16/1f50e.png" loading="lazy"  width="16" height="16" alt="[Image: 1f50e.png]" class="mycode_img" /> Chapter 2 - No Poison Code, No Attack<br />
Scan the entire system endpoint, server, email - no ransomware detection, no strange VPN access, no manipulation of suspicious printing or sending files.<br />
But while testing a PM’s (Project Manager) device, I noticed the “ScreenShare Pro” app – a free screen sharing software, manually installed 2 months ago.<br />
“I use it for demo calls with foreign vendors. They say this software is easier to use than Zoom.” – The PM replied.<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/t7c/1/16/1f9e0.png" loading="lazy"  width="16" height="16" alt="[Image: 1f9e0.png]" class="mycode_img" /> Chapter 3 - Deep Investigation Analysis<br />
I threw away the event logs and found:<br />
• ScreenShare Pro opens the session without warning, lasts 45 minutes<br />
• Meanwhile, the user opens files: Project_Proposal_V4. pptx, DB_Design_Confidential. vsdx<br />
• This app doesn't save meeting logs and doesn't show the red frame to warn about sharing<br />
I teamed up with Wireshark and found:<br />
• It's connecting strange TLS to an unknown address server (running on anonymous VPS)<br />
• The protocol used is proprietary - it can't be decoded, but the traffic is quite large, suitable for visual television<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/t6b/1/16/1f575.png" loading="lazy"  width="16" height="16" alt="[Image: 1f575.png]" class="mycode_img" /> <img src="https://static.xx.fbcdn.net/images/emoji.php/v9/teb/1/16/2642.png" loading="lazy"  width="16" height="16" alt="[Image: 2642.png]" class="mycode_img" /> Chapter 4 - The user is exploited<br />
I reset my timeline:<br />
1. The seller asks the PM to install screen sharing software "easier than Z"<br />
2. Download PM from external link (not official website)<br />
3. Every time the demo calls, the seller asks "turn on screen sharing of the entire desktop to easily monitor the operation"<br />
4. One of those times - the moment when the PM opens technical documents to copy paste architectural demo<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/tac/1/16/1f4cc.png" loading="lazy"  width="16" height="16" alt="[Image: 1f4cc.png]" class="mycode_img" /> Investigation conclusion<br />
• Vector intrusion: Use of trust, forcing victims to install unwanted software<br />
• Behavior: Use screen sharing to record the screen without the need for unique codes or machine hacking.<br />
• Impact level: Leak product architecture, suggest competitors, and convince customers.<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/tdc/1/16/26a0.png" loading="lazy"  width="16" height="16" alt="[Image: 26a0.png]" class="mycode_img" /> Lesson learned<br />
It’s not the file you send that’s dangerous – it’s what you display.<br />
Modern hackers don’t have to pick locks – they’re waiting for you… Enable sharing at the right time.]]></description>
			<content:encoded><![CDATA[Real Screen"<br />
(How a Screen Sharing Tool Became a Hacker's Window)<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/t2d/1/16/1f4cd.png" loading="lazy"  width="16" height="16" alt="[Image: 1f4cd.png]" class="mycode_img" />Chapter 1 - Missing Contract<br />
A technology company specializing in software development for a major banking company in the ASEAN region. On the day of the project submission, the client's feedback:<br />
"Unfortunately, your opponent came up with a better pricing package - and, strangely enough, understands the entire architecture you proposed."<br />
This company never shared the architecture with anyone except internally.<br />
I was invited to investigate.<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/t42/1/16/1f50e.png" loading="lazy"  width="16" height="16" alt="[Image: 1f50e.png]" class="mycode_img" /> Chapter 2 - No Poison Code, No Attack<br />
Scan the entire system endpoint, server, email - no ransomware detection, no strange VPN access, no manipulation of suspicious printing or sending files.<br />
But while testing a PM’s (Project Manager) device, I noticed the “ScreenShare Pro” app – a free screen sharing software, manually installed 2 months ago.<br />
“I use it for demo calls with foreign vendors. They say this software is easier to use than Zoom.” – The PM replied.<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/t7c/1/16/1f9e0.png" loading="lazy"  width="16" height="16" alt="[Image: 1f9e0.png]" class="mycode_img" /> Chapter 3 - Deep Investigation Analysis<br />
I threw away the event logs and found:<br />
• ScreenShare Pro opens the session without warning, lasts 45 minutes<br />
• Meanwhile, the user opens files: Project_Proposal_V4. pptx, DB_Design_Confidential. vsdx<br />
• This app doesn't save meeting logs and doesn't show the red frame to warn about sharing<br />
I teamed up with Wireshark and found:<br />
• It's connecting strange TLS to an unknown address server (running on anonymous VPS)<br />
• The protocol used is proprietary - it can't be decoded, but the traffic is quite large, suitable for visual television<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/t6b/1/16/1f575.png" loading="lazy"  width="16" height="16" alt="[Image: 1f575.png]" class="mycode_img" /> <img src="https://static.xx.fbcdn.net/images/emoji.php/v9/teb/1/16/2642.png" loading="lazy"  width="16" height="16" alt="[Image: 2642.png]" class="mycode_img" /> Chapter 4 - The user is exploited<br />
I reset my timeline:<br />
1. The seller asks the PM to install screen sharing software "easier than Z"<br />
2. Download PM from external link (not official website)<br />
3. Every time the demo calls, the seller asks "turn on screen sharing of the entire desktop to easily monitor the operation"<br />
4. One of those times - the moment when the PM opens technical documents to copy paste architectural demo<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/tac/1/16/1f4cc.png" loading="lazy"  width="16" height="16" alt="[Image: 1f4cc.png]" class="mycode_img" /> Investigation conclusion<br />
• Vector intrusion: Use of trust, forcing victims to install unwanted software<br />
• Behavior: Use screen sharing to record the screen without the need for unique codes or machine hacking.<br />
• Impact level: Leak product architecture, suggest competitors, and convince customers.<br />
⸻<br />
<img src="https://static.xx.fbcdn.net/images/emoji.php/v9/tdc/1/16/26a0.png" loading="lazy"  width="16" height="16" alt="[Image: 26a0.png]" class="mycode_img" /> Lesson learned<br />
It’s not the file you send that’s dangerous – it’s what you display.<br />
Modern hackers don’t have to pick locks – they’re waiting for you… Enable sharing at the right time.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Awesome resource of free courses]]></title>
			<link>https://ired.dev/showthread.php?tid=10</link>
			<pubDate>Sat, 14 Jun 2025 14:19:32 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=20">Kael</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=10</guid>
			<description><![CDATA[Do you want to learn ethical hacking, pentesting, OSINT, or digital forensics without spending a dime? Here's an awesome resource:<br />
<br />
<span style="color: #ff4136;" class="mycode_color">XXXXX(Violation of Forum rules)</span><br />
<br />
You'll find premium courses completely free, from beginner intros to certification prep like CEH, OSCP, CompTIA, and more.<br />
<br />
? Perfect for those just starting out or looking to level up without financial barriers.]]></description>
			<content:encoded><![CDATA[Do you want to learn ethical hacking, pentesting, OSINT, or digital forensics without spending a dime? Here's an awesome resource:<br />
<br />
<span style="color: #ff4136;" class="mycode_color">XXXXX(Violation of Forum rules)</span><br />
<br />
You'll find premium courses completely free, from beginner intros to certification prep like CEH, OSCP, CompTIA, and more.<br />
<br />
? Perfect for those just starting out or looking to level up without financial barriers.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[?️ OSINT Tools for gathering information and actions forensics ?️]]></title>
			<link>https://ired.dev/showthread.php?tid=5</link>
			<pubDate>Fri, 13 Jun 2025 22:10:37 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=5</guid>
			<description><![CDATA[<a href="https://github.com/danieldurnea/FBI-tools" target="_blank" rel="noopener" class="mycode_url">https://github.com/danieldurnea/FBI-tools</a>]]></description>
			<content:encoded><![CDATA[<a href="https://github.com/danieldurnea/FBI-tools" target="_blank" rel="noopener" class="mycode_url">https://github.com/danieldurnea/FBI-tools</a>]]></content:encoded>
		</item>
	</channel>
</rss>