veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

208
active users

#ctf

4 posts4 participants0 posts today

How many unauthenticated file transfer servers are still exposed online in 2025? 🌐🔓

A critical flaw in CrushFTP, tracked as CVE-2025-2825, is being actively exploited in the wild. The vulnerability affects versions 10.0.0 through 10.8.3 and version 11.0.0, and it allows remote attackers to bypass authentication entirely using specially crafted HTTP or HTTPS requests. Public proof-of-concept code is already circulating, lowering the barrier for exploitation.

Shadowserver, a nonprofit security watchdog, reported that over 1,500 vulnerable instances remain online as of March 30, 2025. Just two days earlier, around 1,800 instances were detected, with more than half located in the U.S. These numbers suggest that many organizations haven't taken mitigation steps despite clear warnings.

The CrushFTP team has urged users to either patch immediately or, if an update isn't feasible, isolate installations using a DMZ configuration. This can reduce the attack surface but is not a long-term fix.

This type of vulnerability is particularly concerning because unauthenticated access to managed file transfer software often leads to sensitive data exposure or ransomware deployment. Groups like Cl0p have historically targeted platforms like MOVEit, Accellion FTA, and GoAnywhere MFT using similar flaws. In January, Cl0p claimed responsibility for exploiting Cleo file transfer software to breach dozens of companies.

CrushFTP's CVE-2025-2825 carries a CVSS score of 9.8. That reflects the ease of exploitation and the potential impact of compromise. For systems handling regulated or confidential data, the urgency is not optional—patching is essential.

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

Im Umfeld des @RaumZeitLabor formt sich gerade ein neues #CTF-Team. Wenn ihr Bock habt euch regelmäßig vor Ort in Mannheim mit anderen zum lernen und pwnen zu treffen, guckt mal nächsten Montag 28.04. um 19Uhr zum ersten regulären Treffen im Space vorbei. Alle Skill-Level sind willkommen. Weitere Infos folgen voraussichtlich dannach auf Website/Mailingliste/Wiki/Masto
raumzeitlabor.de/kontakt/anfah

raumzeitlabor.deAnfahrt - RaumZeitLabor | Digitalkultur im Rhein-Neckar-Dreieck
Continued thread

2/3
Im Detail lag die Datei in einem Verzeichnis mit Mode 1777 (sticky Bit am Verzeichnis gesetzt), die zu schreibende Datei gehörte nicht dem der Schreiben wollte/sollte - ein Prozess unter einer anderen UserID. Die Datei war mit Absicht Mode 666 (rw-rw-rw-) eben damit geschrieben werden kann, Standard unter Unix seit zigzig Jahren.

Stellt sich am Ende raus: das ist Linux-only und abhängig von einem sysctl.

New Open-Source Tool Spotlight 🚨🚨🚨

Google's GRR (GRR Rapid Response) is an open-source framework for remote live forensics and incident response. It allows security teams to investigate systems at scale without interrupting operations. Used for data collection, analysis, and hunting. #CyberSecurity #DFIR

🔗 Project link on #GitHub 👉 github.com/google/grr

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

Rainy Sunday, poking at Earth from VulnHub.

Ran dirsearch, tried nikto, got the usual noise.
Then I noticed something in the nmap scan:
earth.local and terratest.earth.local 🤔

/etc/hosts to the rescue.

Sometimes the trick isn’t brute force, it’s reading carefully.
Pentesting 101: Don’t ignore the scan output!