1
1
submitted 2 months ago by [email protected] to c/[email protected]
2
1
submitted 3 months ago by [email protected] to c/[email protected]
3
3
submitted 6 months ago by [email protected] to c/[email protected]
4
3
submitted 9 months ago by [email protected] to c/[email protected]
5
0
submitted 9 months ago by [email protected] to c/[email protected]
6
0
submitted 9 months ago by [email protected] to c/[email protected]
7
1
submitted 9 months ago by [email protected] to c/[email protected]
8
1
submitted 9 months ago by [email protected] to c/[email protected]
9
1
submitted 9 months ago by [email protected] to c/[email protected]
10
1
submitted 1 year ago by [email protected] to c/[email protected]
11
1
submitted 1 year ago by [email protected] to c/[email protected]
12
2
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]

Dozens of Ruby-related CVEs have been caused by user input being passed to the top-level Kernel.open() method, which not only accepts paths or URIs (if open-uri has been loaded), but also "|command-here" commands which are then opened using IO.popen() resulting in Remote Command Execution (RCE) vulnerabilities. In the next minor Ruby version (3.3.0) a deprecation warning will be printed if a "|command-here" input is given to Kernel.open(). Hopefully, in Ruby 4.0 this insecure feature will be removed.

13
3
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]

You may have recently read a news story about how a typo in a US military email address (@.mil -> @.ml) accidentally caused sensitive military secrets to be sent to a similar Mali email address for years.

What if I told you, you could use Ronin to find all of the one-character-missing valid typos for all of the TLDs?

14
1
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]

Checkout what new features were added in ronin-code-sql 2.1.0. Using ronin-code-sql you can generate complex and obfuscated SQL injections (SQLi).

15
1
submitted 1 year ago by [email protected] to c/[email protected]

A quick reference cheat sheet on how to port pwnlib code to Ronin.

16
1
submitted 1 year ago by [email protected] to c/[email protected]

A quick reference cheat sheet on how to port Python code to Ruby/Ronin code.

17
1
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]

A multi-part guide on how to write quick Ruby scripts using the ronin-support library. ronin-support is sort of like activesupport meets Python's pwnlib, but in Ruby.

18
2
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]

A step-by-step guide explaining how to port a Metasploit Exploit to Ronin Exploits. Ronin Exploits is a simpler, more Object Orientated, micro-framework for writing and running exploits.

19
1
submitted 1 year ago by [email protected] to c/[email protected]

Ever wanted to know more about the Ronin CLI, how to use ronin-repos or ronin-db, how to write Ruby scripts using ronin-support, or how to port Metasploit Payloads to ronin-payloads? We now have eight new Guides on those topics. Check it out!

Ruby InfoSec

165 readers
1 users here now

Where Ruby and InfoSec intersect.

founded 1 year ago
MODERATORS