gotr00t@blog:~$

Security Blog

Deep dives into vulnerabilities, research findings, and offensive security techniques

February 13, 2026

Reading the Room: Detecting Firewalls Before They Detect You

Understanding firewall detection during post-exploitation is critical for mapping the control plane. Learn how to identify iptables, nftables, firewalld, UFW, and more on compromised Linux systems using a custom detection script shared publicly for the first time.

Post-Exploitation Firewalls Linux Bash
Read Full Post
January 29, 2026

Post-Exploitation: Shells are just the beginning (Part 2)

Continuing the post-exploitation series with lateral movement and pivoting techniques. Learn Living Off The Land (LOTL), SSH tunneling (local & remote port forwarding), SSH key reuse exploitation, and SOCKS proxying with proxychains for network access.

Pivoting Lateral Movement SSH Tunneling Post-Exploitation
Read Full Post
January 19, 2026

Post-Exploitation: Shells are just the beginning (Part 1)

A shell is just a foothold. This series walks you through privilege escalation techniques on Linux/Unix systems including SUID exploitation, kernel vulnerabilities like DirtyCow, and sudo misconfigurations. Learn how attackers turn limited access into root.

Privilege Escalation Linux SUID Post-Exploitation
Read Full Post
December 10, 2025

React2Shell (CVE-2025-55182): Unauthenticated RCE in React Server Components

Critical unauthenticated remote code execution vulnerability in React Server Components and Next.js. Discover how prototype pollution, promise confusion, and unsafe deserialization combine to create a devastating RCE attack vector affecting hundreds of thousands of exposed instances.

RCE CVE-2025-55182 React Next.js
Read Full Post
December 1, 2025

From Trading Secrets to Public Repos: The Death of the Underground Hacking Scene

A reflection on how the underground hacking scene has evolved from exclusive information trading networks to public repositories. Exploring what was gained and what was lost in the shift from private channels to open-source knowledge sharing.

Culture Hacking Scene Philosophy History
Read Full Post
November 15, 2025

GraphQL Introspection: When Your API Documentation Becomes Your Biggest Security Risk

Discovered a production GraphQL endpoint with introspection queries enabled, exposing the entire API schema. Learn how API reconnaissance through introspection can lead to sensitive data disclosure and other attacks using Gsec and Burp Suite.

GraphQL API Security Information Disclosure Introspection
Read Full Post
October 3, 2025

CVE-2025-24893: Unauthenticated Remote Code Execution in XWiki

Critical vulnerability in XWiki's SolrSearch macro allowing unauthenticated remote code execution. Learn how a single HTTP GET request can compromise an entire XWiki instance through Groovy template injection.

RCE CVE-2025-24893 Groovy Unauthenticated
Read Full Post
August 24, 2025

Mirth Connect RCE: When Healthcare Data Meets Insecure Defaults

From version detection to reverse shell: exploiting critical vulnerabilities in Mirth Connect. Deep dive into CVE-2023-43208 authentication bypass and healthcare system exploitation techniques.

RCE Healthcare CVE-2023-43208 Authentication Bypass
Read Full Post
August 23, 2025

Jenkins Server Exploitation: Unauthenticated RCE and Data Exfiltration

Discovered a Jenkins server with exposed script console allowing unauthenticated access. Learn how to execute commands, extract AWS metadata, and establish reverse shells through Groovy script execution.

RCE Jenkins Groovy Data Exfiltration
Read Full Post
August 22, 2025

CORS Misconfiguration Vulnerabilities

Deep dive into how I discovered a CORS misconfiguration vulnerability in Chime. Learn the methodology, exploitation techniques, and how to build a working PoC for information disclosure attacks.

Web Security CORS Information Disclosure Bug Bounty
Read Full Post
August 21, 2025

Unauthorized Cache Purge Access

Discovered a critical vulnerability where the PURGE HTTP method is accessible without authentication, allowing attackers to clear website cache and cause severe performance degradation and potential DoS conditions.

Web Security DoS Cache Bug Bounty
Read Full Post