<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[tobsec's blog]]></title><description><![CDATA[tobsec's blog]]></description><link>https://tobsec.com</link><generator>RSS for Node</generator><lastBuildDate>Tue, 07 Apr 2026 19:55:53 GMT</lastBuildDate><atom:link href="https://tobsec.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[PowerFolder <17.3 affected by Information Disclosure Vulnerability (CVE-2022-38793) #CampusCloud]]></title><description><![CDATA[Vendor of Product: dal33t GmbH
Affected Product Code Base: PowerFolder <17.3
Affected Component: list of share links (powerfold.er/linkstable)
Vulnerability Type: Incorrect Access Control
Impact: Information Disclosure
Attack Type: Remote
Attack Vect...]]></description><link>https://tobsec.com/powerfolder-below-v17-3-affected-by-information-disclosure-vulnerability-cve-2022-38793-campuscloud</link><guid isPermaLink="true">https://tobsec.com/powerfolder-below-v17-3-affected-by-information-disclosure-vulnerability-cve-2022-38793-campuscloud</guid><category><![CDATA[CVE]]></category><category><![CDATA[vulnerability]]></category><category><![CDATA[databreach]]></category><category><![CDATA[powerfolder]]></category><dc:creator><![CDATA[Tobias Reich]]></dc:creator><pubDate>Sun, 28 Aug 2022 10:50:11 GMT</pubDate><content:encoded><![CDATA[<p>Vendor of Product: dal33t GmbH</p>
<p>Affected Product Code Base: PowerFolder &lt;17.3</p>
<p>Affected Component: list of share links (powerfold.er/linkstable)</p>
<p>Vulnerability Type: Incorrect Access Control</p>
<p>Impact: Information Disclosure</p>
<p>Attack Type: Remote</p>
<p>Attack Vectors: authenticated, logic flaw exploit</p>
<p>Has vendor confirmed or acknowledged the vulnerability? Yes</p>
<p>Reference: <a target="_blank" href="https://powerfolder.atlassian.net/wiki/spaces/PF/pages/2150072341/PowerFolder+Server+17+SP3">https://powerfolder.atlassian.net/wiki/spaces/PF/pages/2150072341/PowerFolder+Server+17+SP3</a></p>
<p>Suggested description:
In dal33t PowerFolder before 17.3.102, an authenticated attacker can obtain a list of all file-share links of all users, even though the intended behavior is to obtain the list of only this user's own links.</p>
<p>To exploit this, the attacker must visit /linkstable before creating any folder of their own.</p>
<p>This vendor tracks this issue as "INT-642 - Link visibility problems when user has no folders."</p>
<p>Discoverer: the developers knew about the vulnerability and its severity but did not inform their customers (dozens of universities and some companies in Germany and abroad).</p>
<p>When I discovered the unpatched vulnerability in my University's CampusCloud and found out the customers haven't been informed by the vendor, I decided to request a CVE and make this publication.</p>
<p>Please, use this information responsibly and only to urge the admins of affected instances to update immediately. The exploit requires a verified personal account and PowerFolder logs any access to those share links. </p>
<p>You can also take a look at the login page's source code to check the version:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1661683349950/okWGkRsUz.png" alt="image.png" /></p>
<p>Every version &lt;17.3 is vulnerable.</p>
]]></content:encoded></item><item><title><![CDATA[Cybersecurity Community on Linkedin and Discord]]></title><description><![CDATA[These are the community resources I feel are the most valuable to me, personally:
Discord:

TryHackMe: https://discord.gg/tryhackme
Hack The Box: https://discord.gg/hRXnCFA
Offensive Security: https://discord.gg/offsec
John Hammond: http://johnhammon...]]></description><link>https://tobsec.com/cybersecurity-community-on-linkedin-and-discord</link><guid isPermaLink="true">https://tobsec.com/cybersecurity-community-on-linkedin-and-discord</guid><category><![CDATA[community]]></category><category><![CDATA[networking]]></category><category><![CDATA[social media]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[resources]]></category><dc:creator><![CDATA[Tobias Reich]]></dc:creator><pubDate>Thu, 24 Feb 2022 10:59:47 GMT</pubDate><content:encoded><![CDATA[<p>These are the community resources I feel are the most valuable to me, personally:</p>
<p><strong>Discord:</strong></p>
<ul>
<li>TryHackMe: <a target="_blank" href="https://discord.gg/tryhackme">https://discord.gg/tryhackme</a></li>
<li>Hack The Box: <a target="_blank" href="https://discord.gg/hRXnCFA">https://discord.gg/hRXnCFA</a></li>
<li>Offensive Security: <a target="_blank" href="https://discord.gg/offsec">https://discord.gg/offsec</a></li>
<li><p>John Hammond: <a target="_blank" href="http://johnhammond.org:8080/discord">http://johnhammond.org:8080/discord</a></p>
</li>
<li><p>Simply Cyber (Gerald Auger): <a target="_blank" href="https://discord.gg/VsNWyZnJBT">https://discord.gg/VsNWyZnJBT</a></p>
</li>
<li>Cyber Insecurity (Neal Bridges): <a target="_blank" href="https://discord.gg/GQWU5G9">https://discord.gg/GQWU5G9</a></li>
<li>TCM Security: <a target="_blank" href="https://discord.gg/tcm">https://discord.gg/tcm</a></li>
<li>David Bombal: <a target="_blank" href="https://discord.gg/usKSyzb">https://discord.gg/usKSyzb</a></li>
<li>VulnHub: <a target="_blank" href="https://discord.gg/uHn4xdb">https://discord.gg/uHn4xdb</a></li>
<li>hak5: <a target="_blank" href="https://discord.gg/QfmZFTyTY2">https://discord.gg/QfmZFTyTY2</a></li>
</ul>
<p><strong>Linkedin:</strong></p>
<ul>
<li>John Hammond: <a target="_blank" href="https://www.linkedin.com/in/johnhammond010/">https://www.linkedin.com/in/johnhammond010/</a></li>
<li>Gerald Auger (Simply Cyber): <a target="_blank" href="https://www.linkedin.com/in/geraldauger/">https://www.linkedin.com/in/geraldauger/</a></li>
<li>Neal Bridges (Cyber Insecurity): <a target="_blank" href="https://www.linkedin.com/in/nealbridges/">https://www.linkedin.com/in/nealbridges/</a></li>
<li>Heath Adams (TCM Security): <a target="_blank" href="https://www.linkedin.com/in/heathadams/">https://www.linkedin.com/in/heathadams/</a></li>
<li>David Bombal: <a target="_blank" href="https://www.linkedin.com/in/davidbombal">https://www.linkedin.com/in/davidbombal</a></li>
</ul>
<p>If I forgot somebody or a discord link, please, let me know!</p>
]]></content:encoded></item><item><title><![CDATA[This Special Char Can Really SCREW You: RLO (right-to-left override)]]></title><description><![CDATA[Windows users, did you know that an .exe or .bat file can look like a .jpg or .png file with the RLO (right-to-left override) character?
Here are two examples:
A batch file like comment_space-vs-gnp.bat could look like an innocent PNG image like -> c...]]></description><link>https://tobsec.com/this-special-char-can-really-screw-you-rlo-right-to-left-override</link><guid isPermaLink="true">https://tobsec.com/this-special-char-can-really-screw-you-rlo-right-to-left-override</guid><category><![CDATA[Windows]]></category><dc:creator><![CDATA[Tobias Reich]]></dc:creator><pubDate>Thu, 17 Feb 2022 11:34:52 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1645269504139/PRjlr3T6q.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Windows users, did you know that an <code>.exe</code> or <code>.bat</code> file can look like a <code>.jpg</code> or <code>.png</code> file with the <code>RLO</code> (right-to-left override) character?</p>
<p>Here are two examples:
A batch file like <code>comment_space-vs-gnp.bat</code> could look like an innocent PNG image like -&gt; <code>comment_space-vs-tab.png</code></p>
<p>And an EXE like <code>luxury_picture_delugpj.exe</code> could seem ingenuous as an JPG picture -&gt; <code>luxury_picture_deluexe.jpg</code></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1645268994323/mhM2qcnHN.png" alt="image.png" /></p>
<p>With an embedded icon the EXE would also look like a picture thumbnail.</p>
<p>How is this possible?</p>
<p>When <strong>renaming</strong> a file like <code>luxury_picture_delugpj.exe</code> in Windows -&gt; place the cursor where you want the rest of the file name to appear spelled backwards (like <code>luxury_picture_delu[CURSOR-HERE]gpj.exe</code>) -&gt; press the right mouse button -&gt; select <strong>Insert Unicode control character</strong> (sounds dodgy already, right?) -&gt; and hit <strong>RLO</strong> -&gt; press ENTER / save the file name -&gt; and it's DONE</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1645269504139/PRjlr3T6q.png" alt="image.png" /></p>
<p>The file name should now appear as in the 1st picture above: <code>luxury_picture_deluexe.jpg</code>. However, it <strong>is</strong> in fact still the very same <strong>EXE</strong>.</p>
<p>So, how to avoid getting screwed by an innocent looking ransomware, you may ask?</p>
<p>Simply and as ever before: <strong>NEVER TRUST FILE EXTENSIONS!</strong></p>
<p>Plus: <em>Some</em> antivirus solutions might flag such RLO files as suspicious - so you might check out if yours does so.</p>
]]></content:encoded></item><item><title><![CDATA[MUST-HAVE Tool for OSINT, Investigations and Graph Analysis: MALTEGO]]></title><description><![CDATA[If you're interested in #osint, #digitalforensics and #investigation tools and you haven't used or heard of Maltego Technologies' awesome graph analysis solution to this, yet, I can warmly recommend you taking their free essentials course as an insig...]]></description><link>https://tobsec.com/must-have-tool-for-osint-investigations-and-graph-analysis-maltego</link><guid isPermaLink="true">https://tobsec.com/must-have-tool-for-osint-investigations-and-graph-analysis-maltego</guid><category><![CDATA[tools]]></category><category><![CDATA[free]]></category><category><![CDATA[course]]></category><dc:creator><![CDATA[Tobias Reich]]></dc:creator><pubDate>Sat, 12 Feb 2022 11:57:08 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1645271781879/xV9EoFKkM.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you're interested in #osint, #digitalforensics and #investigation tools and you haven't used or heard of Maltego Technologies' awesome graph analysis solution to this, yet, I can warmly recommend you taking their free essentials course as an insightful and fun introduction: <a target="_blank" href="https://courses.maltego.com/courses/maltego-essentials-v1">courses.maltego.com/courses/maltego-essentials-v1</a></p>
<p>#maltego #freecourse #osintforgood #dothefreestufffirst #kalilinux #ethicalhacking #cybersecuity #graphanalytics</p>
]]></content:encoded></item><item><title><![CDATA[How to get into HACKING real QUICK:
New Pre-Security Learning Path on TryHackMe!]]></title><description><![CDATA[If you're even slightly interested in Ethical Hacking and Cyber Security and haven't heard of TryHackMe, I really can't emphasize enough, that you should definitely check it out - I mean like click on that (yes it's a referral, thanks and you're welc...]]></description><link>https://tobsec.com/how-to-get-into-hacking-real-quick-new-pre-security-learning-path-on-tryhackme</link><guid isPermaLink="true">https://tobsec.com/how-to-get-into-hacking-real-quick-new-pre-security-learning-path-on-tryhackme</guid><category><![CDATA[hacking]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[course]]></category><category><![CDATA[learning]]></category><dc:creator><![CDATA[Tobias Reich]]></dc:creator><pubDate>Tue, 06 Jul 2021 00:24:43 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1645272045418/v3Gh5w7vm.avif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you're even slightly interested in Ethical Hacking and Cyber Security and haven't heard of <a target="_blank" href="https://tryhackme.com/signup?referrer=63e38fd841cd3dc9f6dab0e2b8a9b7404970bd25">TryHackMe</a>, I really can't emphasize enough, that you should definitely check it out - I mean like click on that (yes it's a referral, thanks and you're welcome) link now ;)</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1625617752807/bQUYuEwGx.png" alt="THM Logo" /></p>
<p>I personally have participated in a considerable number of CTFs (hacking challenges) by now, rooted some machines on HackTheBox and enjoyed some dedicated Kali Linux training already - and STILL I really enjoy even the basic stuff on THM! Why? I mean, look at it! How nicely it's layed-out, how thoroughly gamified and just how MUCH high-quality CONTENT there is:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1625615976861/EQC1ljEAP.png" alt="as of now there are over 400 public rooms (labs) available" /></p>
<p>And all of them are deliberately focusing on the point. So, you will learn A LOT real quick.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1625615812266/aoJITkmAGE.png" alt="Screenshot 2021-07-07 at 01-55-54 TryHackMe Cyber Security Training.png" /></p>
<p>And just recently, THM has released the new <a target="_blank" href="https://tryhackme.com/path/outline/presecurity">Pre Security</a> Learning Path, which allows so-to-say ANYONE with a basic understanding of computers and the internet to learn the most important prerequisites of all those further hacking rooms and learning paths within a couple of days!</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1625616361878/9Df-Qas8Q.png" alt="Inside the Pre Security Learning Path" /></p>
<p>Here you can see how they gamified learning "boring" stuff like the OSI-model:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1625616632485/iP5DAqofH.png" alt="OSI game" /></p>
<p>And here the TCP 3-way-handshake:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1625616697699/ncFezQGo7.png" alt="Human TCP Conversation" /></p>
<p>If you've ever thought something like "one of the things I'll never learn in my life is how to ride the unicycle and hacking", go to <a target="_blank" href="https://tryhackme.com/signup?referrer=63e38fd841cd3dc9f6dab0e2b8a9b7404970bd25">tryhackme.com</a> straight away, register and head over to the <a target="_blank" href="https://tryhackme.com/path/outline/presecurity">Pre Security Learning Path</a> and you'll almost certainly be surprised how much fun it can be to learn all this stuff in a gamified byte-sized manner!</p>
<p>Oh, and there might be one more motivation waiting for you – to earn such a fancy-glancy CERTIFICATE with you name on it:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1625617369752/gS9YjQXuM.png" alt="TryHackMe Pre Security Learning Path Certificate" /></p>
<p><a target="_blank" href="https://tryhackme.com/signup?referrer=63e38fd841cd3dc9f6dab0e2b8a9b7404970bd25">go!</a></p>
]]></content:encoded></item></channel></rss>