🛡️🚨🚨 Bypass Really Simple Security | CVE-2024-10924 | TryHackMe 🛡️

preview_player
Показать описание
🛡️ Learn how to exploit a WordPress website using CVE-2024-10924 and understand various mitigation techniques.🚨

🛡️ WordPress is one of the most popular open-source Content Management Systems (CMS) and it is widely used to build websites ranging from blogs to e-commerce platforms. In November 2024, a critical vulnerability was discovered in the Really Simple Security plugin, a widely adopted security plugin used by millions of websites. The vulnerability allowed attackers to bypass authentication and gain unauthorised access to user accounts, including those with administrative privileges. Since WordPress is a CMS, gaining administrative access sometimes allows you even to perform privilege escalation and get complete control of the server/network. Discovered by István Márton from Wordfence, this flaw was assigned a critical severity rating and CVE-ID 2024-10924.

🛡️ Room Link: 🛡️

🛡️ PHP class Rsssl_Two_Factor_On_Board_Api: 🛡️

👍 Like, Subscribe, and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept, feel free to drop a comment below!

👍 these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge.

#TryHackMeWalkthrough #TryHackMeRoom #CyberSecurity #HackingTutorial #SecurityExploits #PenetrationTesting #InfoSec #EthicalHacking #CVE202410924
Рекомендации по теме
Комментарии
Автор

i finished room before watching, fun room, nice work

terraflops
Автор

Will you download video room FAT32 Analysis?

mohammedelsayed-os
Автор

Good but you took us into a Rabbit hole

DreamTech
join shbcf.ru