<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Escalation to L2 on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/escalation-to-l2/</link><description>Recent content in Escalation to L2 on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Tue, 14 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/escalation-to-l2/index.xml" rel="self" type="application/rss+xml"/><item><title>LD-Lumma Stealer - DLL Side-Loading via Click Fix Phishing</title><link>https://hexpysya.github.io/blue_team/ld-lumma-stealer---dll-side-loading-via-click-fix-phishing/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-lumma-stealer---dll-side-loading-via-click-fix-phishing/</guid><description>A Click Fix phishing email impersonating Microsoft lured Dylan into visiting a malicious site, which executed a disguised PowerShell command launching mshta.exe to download Lumma Stealer payload from overcoatpassably.shop. The host was contained before confirmed data exfiltration.</description></item><item><title>LD-Malicious Macro Executed</title><link>https://hexpysya.github.io/blue_team/ld-malicious-macro-has-been-executed/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-malicious-macro-has-been-executed/</guid><description>A phishing email from &lt;a href="mailto:jake.admin@cybercommunity.info" &gt;jake.admin@cybercommunity.info&lt;/a&gt; delivered a ZIP-archived Word macro document, which executed a PowerShell downloader fetching messbox.exe from greyhathacker.net. The host Jayne was contained after execution was confirmed.</description></item><item><title>LD-Possible IDOR Attack Detected</title><link>https://hexpysya.github.io/blue_team/ld-idor/</link><pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-idor/</guid><description>External IP enumerated the /get_user_info/ endpoint via sequential IDOR requests, all returning HTTP 200 - confirming successful data exfiltration across five user accounts.</description></item><item><title>LD-Whoami Command Detected in Request Body</title><link>https://hexpysya.github.io/blue_team/ld-whoami-command-detected-in-request-body/</link><pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-whoami-command-detected-in-request-body/</guid><description>An external attacker from a CHINANET-hosted IP (61.177.172.87) exploited a command injection vulnerability on WebServer1004, executing five OS commands via the ?c= parameter against /video/ - including cat /etc/passwd and cat /etc/shadow - all of which returned HTTP 200 with distinct response sizes, confirming successful remote code execution. The case was escalated to Tier 2.</description></item><item><title>LD-Arbitrary File Read on Checkpoint Security Gateway (CVE-2024-24919)</title><link>https://hexpysya.github.io/blue_team/ld-arbitrary-file-read-on-checkpoint-security-gateway-cve-2024-24919/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-arbitrary-file-read-on-checkpoint-security-gateway-cve-2024-24919/</guid><description>An attacker exploited CVE-2024-24919 against a Check Point Security Gateway, successfully reading /etc/passwd via a path traversal payload. A second request targeting /etc/shadow from a related IP was blocked. The attack succeeded and the endpoint was escalated to Tier 2.</description></item><item><title>LD-CVE-2025-53770 SharePoint ToolShell Auth Bypass and RCE</title><link>https://hexpysya.github.io/blue_team/ld-cve202553770-sharepoint-toolshell-auth-bypass-and-rce/</link><pubDate>Sun, 22 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-cve202553770-sharepoint-toolshell-auth-bypass-and-rce/</guid><description>An attacker exploited CVE-2025-53770 against a SharePoint server, achieving unauthenticated RCE via .NET deserialization. The attacker extracted the MachineKey, compiled and dropped a payload, planted a webshell in the SharePoint layouts directory, and established a reverse connection to the attacker-controlled server.</description></item><item><title>LD-Deceptive Mail Detected</title><link>https://hexpysya.github.io/blue_team/ld-phishing-alert/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-phishing-alert/</guid><description>A phishing email with a password-protected ZIP delivered AsyncRAT via a SILENTBUILDER dropper. The victim executed the payload, establishing an active C2 channel and triggering full host reconnaissance before containment.</description></item></channel></rss>