<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>No Escalation on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/no-escalation/</link><description>Recent content in No Escalation on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Thu, 02 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/no-escalation/index.xml" rel="self" type="application/rss+xml"/><item><title>LD-Javascript Code Detected in Requested URL</title><link>https://hexpysya.github.io/blue_team/ld-javascript-code-detected-in-requested-url/</link><pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-javascript-code-detected-in-requested-url/</guid><description>An external IP performed XSS reconnaissance against the /search/ endpoint, cycling through multiple injection payloads. All requests except the first returned HTTP 302, indicating server-side sanitization blocked execution. The attack did not succeed.</description></item><item><title>LD-LS Command Detected in Requested URL</title><link>https://hexpysya.github.io/blue_team/ld-ls-command-detected-in-requested-url/</link><pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-ls-command-detected-in-requested-url/</guid><description>Alert triggered on the string &amp;rsquo;ls&amp;rsquo; found in a legitimate search query parameter. The traffic originated from an internal IP to letsdefend.io and contains no malicious payload. False positive - rule lacks context awareness for partial string matches.</description></item><item><title>LD-Passwd Found in Requested URL - Possible LFI Attack</title><link>https://hexpysya.github.io/blue_team/ld-passwd-found-in-requested-url---possible-lfi-attack/</link><pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-passwd-found-in-requested-url---possible-lfi-attack/</guid><description>An external Tencent Cloud IP sent a single LFI request targeting /etc/passwd via path traversal. The server returned HTTP 500 with an empty response body, confirming the attack did not succeed.</description></item><item><title>LD-Possible SQL Injection Payload Detected</title><link>https://hexpysya.github.io/blue_team/ld-possible-sql-injection-payload-detected/</link><pubDate>Sun, 22 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-possible-sql-injection-payload-detected/</guid><description>An external IP hosted on DigitalOcean performed a manual SQL injection reconnaissance against an internal web server, cycling through classic SQLi payloads. All requests returned HTTP 500, confirming the attack did not succeed.</description></item></channel></rss>