<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://saereya.github.io/</id><title>Saereya | Security &amp; Infrastructure</title><subtitle>Security and Infrastructure related topics either from personal experience or professional.</subtitle> <updated>2025-12-29T17:43:02+00:00</updated> <author> <name>Tom</name> <uri>https://saereya.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://saereya.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://saereya.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 Tom </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Mongobleed - CVE-2025-14847</title><link href="https://saereya.github.io/posts/mongobleed-cve-2025-14847/" rel="alternate" type="text/html" title="Mongobleed - CVE-2025-14847" /><published>2025-12-27T20:52:00+00:00</published> <updated>2025-12-29T17:42:38+00:00</updated> <id>https://saereya.github.io/posts/mongobleed-cve-2025-14847/</id> <content type="text/html" src="https://saereya.github.io/posts/mongobleed-cve-2025-14847/" /> <author> <name>Tom</name> </author> <category term="Vulnerabilities" /> <summary>The Vulnerability As an early Christmas present a new vulnerability has been found in MongoDB. The vuln takes advantage of mismatched length fields in Zlib. Simply the server trusts the uncompressedSize claim sent by the client and instead of sending just the uncompressed data buffer back it sends the entire allocated buffer. This is very similiar to the infamous Heartbleed vulnerability in SSL...</summary> </entry> <entry><title>TryHackMe - Hammer</title><link href="https://saereya.github.io/posts/tryhackme-hammer/" rel="alternate" type="text/html" title="TryHackMe - Hammer" /><published>2025-12-23T12:11:00+00:00</published> <updated>2025-12-23T12:11:00+00:00</updated> <id>https://saereya.github.io/posts/tryhackme-hammer/</id> <content type="text/html" src="https://saereya.github.io/posts/tryhackme-hammer/" /> <author> <name>Tom</name> </author> <category term="TryHackMe - Walkthroughs" /> <summary>Hammer is the final room in the Authentication path for Web Application Pentesting. Recon We are provided very little info so first lets do a nmap scan: Starting Nmap 7.95 ( https://nmap.org ) at 2025-12-23 07:13 EST Nmap scan report for 10.81.133.125 Host is up (0.022s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubun...</summary> </entry> <entry><title>Advent of Cyber - Day 21 - Malhare.exe</title><link href="https://saereya.github.io/posts/advent-of-cyber-day-21-malhare-exe/" rel="alternate" type="text/html" title="Advent of Cyber - Day 21 - Malhare.exe" /><published>2025-12-22T16:19:00+00:00</published> <updated>2025-12-22T18:38:02+00:00</updated> <id>https://saereya.github.io/posts/advent-of-cyber-day-21-malhare-exe/</id> <content type="text/html" src="https://saereya.github.io/posts/advent-of-cyber-day-21-malhare-exe/" /> <author> <name>Tom</name> </author> <category term="Advent Of Cyber" /> <summary>HTA App - survey.hta Starting off this room we have a single task file survey.hta. This is a HTA application disguised as a Festive Elf Survey. &amp;lt;hta:application id="APP123080" applicationname="Festival Elf Survey" ... Taking an initial look we can see functions such as decodeBase64 RSBinaryToString getQuestions getQuestions() It looks like getQuestions() is a sneaky function tha...</summary> </entry> </feed>
