From the description:  "Chisel is a fast TCP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server."

    What I like about this tool is that it's a single binary that supports both client and server while also being multi-platform.  What I don't like is that it seems to be very particular about the syntax ordering.  That being said, this is a tool in my toolbox for that very special need.  For example, we know there's a web server at the following address but when we perform an Nmap scan, we don't see it:


    It's pretty rare for me to find MSSQL injections and when I do, I have to dig through my notes to find the differences between MSSQL and MySQL.  If you search for MSSQL vulnerable applications, you don't really find anything.  On the flip side, do the same for MySQL and you'll find all the Damn Vulnerable stuff plus a bunch of others.  Not to mention the numerous legitimate applications with vulnerabilities. 

    Anyway, so I was playing around and in my typical enumeration, I start off with Nmap:


    A client mentioned to me that she was keeping confidential information on a thumb drive that she's been carrying around between her home and office.  When I asked about the type of the confidential data, I followed that question by asking -- if the drive were lost, would that cause a significant problem.  Of course knowing the answer, I then suggested encrypting the thumb drive. 

    This will be a two part post, probably with a separate title -- one for Mac and the other for PC. 

    Starting with Mac, we pull up the Disk Utility tool:


    According to the documentation:  "str_replaceReplace all occurrences of the search string with the replacement string"

    I seem to recall bypassing this some time ago or maybe something similar.  If I recall you could double up on parts, get the replacement to remove parts and end up with what you want.  What you see below came from something else but I pulled it over to my machine because I was trying to figure out if I could get code execution.


    I was playing around with Bootstrap CSS and I had an idea for creating a few different types of logins that all appeared the same but were different.  In the end, I created four different logins and I go into how to bypass them.  Or in the case of one of them, why you can't bypass it. 

    In the first example, we have a PHP login form that has the credentials baked into the PHP. 

    Viewing the UI, we see:


    If your background is development, it's natural to look at pages, code, errors, etc., with a different eye than those of us who come from another avenue.  When I see a url that looks something like: 

    /id=1

    I just automatically assume it's SQL.  The first thing we'll do is insert a single quote to break the SQL statement in hopes that it will throw an error. 


    Page 6 of 57

    © 2020 sevenlayers.com