Saturday, August 3, 2024

at.gov.pt hack cyber Drupal remote execution and url parse injection










 




https://www.exploit-db.com/exploits/41564

https://gist.github.com/joshhartman/5380593

Hack Cyber at.gov.pt NSA tool ( ok @NATO_ACT "good guys" Let´s go back and use a @NSAGov tool for http://at.gov.pt metadata hacking process IT WILL HV A PRICE)


 



https://github.com/oscarotero/Embed

at.gov.pt hack cyber admin tools console listen to events

 


Hack cyber at.gov.pt ( And Again I was using this url 62.28.254.198/postsendRequest(req,%20j)/auth/access_token/client_credentials/id/client_secret but I already hv the username id (json obj) so I´m doing something wrong but, it looks since I´m not in Apache I cant´t migrate forward their server )

 


https://stackoverflow.com/questions/45642893/how-to-get-access-token-for-an-api-by-using-post-method-in-javascript

CYBER hack at.gov.pt ( BACK@WAR hello CYBERWAR 1 I hv an username SG13435 2 my browser seems not to handle the http request as 62.28.254.198/postsendRequest(req, j) I am doing IT WILL HV A PRICE @NATO_ACT "good guys")





https://sar.at.gov.pt/proxy/SCImage?username=SG13435

https://stackoverflow.com/questions/4696283/what-are-res-and-req-parameters-in-express-functions

Man in the Rain