<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Hacking on Hack the Galaxy</title>
    <link>https://johnjhacking.com/categories/hacking/</link>
    <description>Recent content in Hacking on Hack the Galaxy</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <lastBuildDate>Mon, 26 Oct 2020 06:00:00 +0000</lastBuildDate><atom:link href="https://johnjhacking.com/categories/hacking/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Account Takeover on the Jack Daniel&#39;s Tennessee Squire Association Platform</title>
      <link>https://johnjhacking.com/blog/tennessee-squire-account-takeover/</link>
      <pubDate>Mon, 26 Oct 2020 06:00:00 +0000</pubDate>
      
      <guid>https://johnjhacking.com/blog/tennessee-squire-account-takeover/</guid>
      <description>Summary Many people do not know about the Jack Daniel&amp;rsquo;s Tennessee Squires. The Squire Association is an Elite Club for &amp;ldquo;friends of Jack Daniel&amp;rsquo;s&amp;rdquo;. Anyone that has ever dreamed of being a Tennessee Squire knows how difficult - if not impossible it is to obtain membership without paying thousands of dollars (or knowing someone who can nominate you).
Tonight, I give you an inside look of the Squire Association, and their practices.</description>
    </item>
    
    <item>
      <title>CVE-2020-27388: YOURLS 1.5 - 1.7.10, Multiple Stored Cross Site Scripting (XSS) Vulnerabilities in Admin Panel</title>
      <link>https://johnjhacking.com/blog/cve-2020-27388/</link>
      <pubDate>Fri, 23 Oct 2020 18:00:00 +0000</pubDate>
      
      <guid>https://johnjhacking.com/blog/cve-2020-27388/</guid>
      <description>Potential Abuse on a hooked Function There is a potential for abuse with any plugins that implement the hook function ‘shunt_is_valid_user’. In the code below we simply demonstrate that authentication can be completely bypassed by returning TRUE in the hooked function. This would be an ideal place for a stealthy backdoor or any other malicious code. It should be noted that this itself is not a vulnerability, but has a potential to be misused and plugins that use this hook should be checked.</description>
    </item>
    
    <item>
      <title>P1: Critical - Discovering and Foiling a Threat Actor</title>
      <link>https://johnjhacking.com/blog/p1-critical-discovering-and-foiling-a-threat-actor/</link>
      <pubDate>Sun, 27 Sep 2020 06:00:00 +0000</pubDate>
      
      <guid>https://johnjhacking.com/blog/p1-critical-discovering-and-foiling-a-threat-actor/</guid>
      <description>P1: Critical - Discovering and Foiling a Threat Actor Disclaimers, Credits: Thank you to everyone who helped validate any part of the project. It took a lot of work to figure out the extent of who was/is affected. I appreciate all of the help that we have received, with a special thank you to those who confirmed our suspicions.
As a general rule of thumb, we will have to redact specific parts of this writeup as well as completely leave out special homebrewed technology that would give away the affected organizations, or cause further damage.</description>
    </item>
    
  </channel>
</rss>
