Kerlab
Kerberos laboratory to better understand and then detecting attack on kerberos
https://github.com/citronneur/kerlab
#kerberos #pentest #lab
Kerberos laboratory to better understand and then detecting attack on kerberos
https://github.com/citronneur/kerlab
#kerberos #pentest #lab
GitHub
GitHub - citronneur/kerlab: Kerberos laboratory to better understand and then detecting attack on kerberos
Kerberos laboratory to better understand and then detecting attack on kerberos - citronneur/kerlab
CVE-2021-22555: Turning \x00\x00 into 10000$
This is a 15 years old heap out-of-bounds write vulnerability in Linux Netfilter that is powerful enough to bypass all modern security mitigations and achieve kernel code execution
# Technical details — https://github.com/google/security-research/blob/master/pocs/linux/cve-2021-22555/writeup.md
# PoC — https://github.com/google/security-research/tree/master/pocs/linux/cve-2021-22555
#CVE #BoF #Vulns
This is a 15 years old heap out-of-bounds write vulnerability in Linux Netfilter that is powerful enough to bypass all modern security mitigations and achieve kernel code execution
# Technical details — https://github.com/google/security-research/blob/master/pocs/linux/cve-2021-22555/writeup.md
# PoC — https://github.com/google/security-research/tree/master/pocs/linux/cve-2021-22555
#CVE #BoF #Vulns
GitHub
security-research/pocs/linux/cve-2021-22555/writeup.md at master · google/security-research
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. - google/security-research
🔥 Credential Dumping 🔥
Clipboard: https://www.hackingarticles.in/credential-dumping-clipboard/
Local Security Authority: https://www.hackingarticles.in/credential-dumping-local-security-authority-lsalsass-exe/
NTDS.dit https://www.hackingarticles.in/credential-dumping-ntds-dit/
DCSync Attack: https://www.hackingarticles.in/credential-dumping-dcsync-attack/
Windows Autologon Password: https://www.hackingarticles.in/credential-dumping-windows-autologon-password/
Domain Cache Credential: https://www.hackingarticles.in/credential-dumping-domain-cache-credential/
Fake Services: https://www.hackingarticles.in/credential-dumping-fake-services/
Phishing Windows Credentials: https://www.hackingarticles.in/credential-dumping-phishing-windows-credentials/
#infosec #redteaming #cybersecurity #pentest
Clipboard: https://www.hackingarticles.in/credential-dumping-clipboard/
Local Security Authority: https://www.hackingarticles.in/credential-dumping-local-security-authority-lsalsass-exe/
NTDS.dit https://www.hackingarticles.in/credential-dumping-ntds-dit/
DCSync Attack: https://www.hackingarticles.in/credential-dumping-dcsync-attack/
Windows Autologon Password: https://www.hackingarticles.in/credential-dumping-windows-autologon-password/
Domain Cache Credential: https://www.hackingarticles.in/credential-dumping-domain-cache-credential/
Fake Services: https://www.hackingarticles.in/credential-dumping-fake-services/
Phishing Windows Credentials: https://www.hackingarticles.in/credential-dumping-phishing-windows-credentials/
#infosec #redteaming #cybersecurity #pentest
Hacking Articles
Credential Dumping: Clipboard
Learn how attackers use clipboard to dump credentials and how to prevent such attacks in your Windows environment.
#BurpHacksForBounties - Hack 11/30
We mostly use PortSwigger 's Burp Suite pro for corporate pentesting, & we should not capture and store corporate credentials.
Steps that I use and why is it important: 👇
#infosec #appsec #burp #Burpsuite
We mostly use PortSwigger 's Burp Suite pro for corporate pentesting, & we should not capture and store corporate credentials.
Steps that I use and why is it important: 👇
#infosec #appsec #burp #Burpsuite
Steps :
1. Temporary project/session.
2. Login to the application, like normal.
3. Identify which requests to which domains contain credentials.
4. Start the main project in Burp.
5. Add those Domains to SSL passthrough. Proxy > Options > TLS Pass-Through
1. Temporary project/session.
2. Login to the application, like normal.
3. Identify which requests to which domains contain credentials.
4. Start the main project in Burp.
5. Add those Domains to SSL passthrough. Proxy > Options > TLS Pass-Through
Why I do this: I save sessions, and burp will store those credentials and sessions. I personally don't want credentials to be stored in files.
Another important point is we are not testing SSO, rather we are testing App behind SSO.
Another important point is we are not testing SSO, rather we are testing App behind SSO.
#BurpHacksForBounties - Day 12/30
IPtables + Burp Suite + Android Applications. 😍🤓🤫😀
Tricky and length but worth setting up.
#burp #bugbountytips #infosec #security #appsec #bugbountytip
IPtables + Burp Suite + Android Applications. 😍🤓🤫😀
Tricky and length but worth setting up.
#burp #bugbountytips #infosec #security #appsec #bugbountytip
- Add Burp CA to device
- Bypass cert pinning
- Root the device(required for iptable)
Dport 80 routing - run these commands
- Bypass cert pinning
- Root the device(required for iptable)
Dport 80 routing - run these commands
iptables -t nat -A OUTPUT -p tcp --dport 80 -j DNAT --to-destination <BURP_IP>:8080
iptables -t nat -A POSTROUTING -p tcp --dport 80 -j MASQUERADE#BurpHacksForBounties - Day 13/30
How to use Burp in most efficient way and bag a bounty.
In Bug bounty methodology by Uncle Rat (@theXSSrat) :
https://thexssrat.iss.onedium.com/bug-bounty-methodology-v3-0-hunt-like-a-rat-9e030fc54363
#infosec #appsec #bugbounty #bugbountytips
How to use Burp in most efficient way and bag a bounty.
In Bug bounty methodology by Uncle Rat (@theXSSrat) :
https://thexssrat.iss.onedium.com/bug-bounty-methodology-v3-0-hunt-like-a-rat-9e030fc54363
#infosec #appsec #bugbounty #bugbountytips
#BurpHacksForBounties - Tip 14/30
Burp Suite Config provides options for handling configurations for User-level and project-level options.
I personally use this configuration :
#appsec #infosec #burp #bugbountytips #bugbountytip
Burp Suite Config provides options for handling configurations for User-level and project-level options.
I personally use this configuration :
#appsec #infosec #burp #bugbountytips #bugbountytip
Port Forwarding & Tunnelling Cheatsheet
https://www.hackingarticles.in/port-forwarding-tunnelling-cheatsheet/
#infosec #ctf #oscp #pentest #cybersecurity
https://www.hackingarticles.in/port-forwarding-tunnelling-cheatsheet/
#infosec #ctf #oscp #pentest #cybersecurity
Hacking Articles
Port Forwarding & Tunnelling Cheatsheet
Comprehensive Port Forwarding and Tunnelling Cheatsheet covering SSH, Metasploit, Socat, and more for secure connections.
Remote Code Execution in cdnjs of CloudFlare
https://blog.ryotak.me/post/cdnjs-remote-code-execution-en/
#RCE #cdnjs #cloudflare
https://blog.ryotak.me/post/cdnjs-remote-code-execution-en/
#RCE #cdnjs #cloudflare
blog.ryotak.net
Remote code execution in cdnjs of Cloudflare
Preface
(日本語版も公開されています。)
Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments.
This article describes vulnerabilities reported through this program and published…
(日本語版も公開されています。)
Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments.
This article describes vulnerabilities reported through this program and published…
#BurpHacksForBounties - Day 15/30
Macros in Burp Suite by akshita_infosec. I could not have explained it better than she did. Nice work :)
https://akshita-infosec.medium.com/burp-macros-what-why-how-151df8901641
#infosec #appsec #bugbounties #bugbountytips #burp
Macros in Burp Suite by akshita_infosec. I could not have explained it better than she did. Nice work :)
https://akshita-infosec.medium.com/burp-macros-what-why-how-151df8901641
#infosec #appsec #bugbounties #bugbountytips #burp
WiFiDemon
iOS WiFi RCE 0-Day Vulnerability & a 'Zero-Click' Vulnerability That was Silently Patched
https://blog.zecops.com/research/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/
#0day #ios #rce
iOS WiFi RCE 0-Day Vulnerability & a 'Zero-Click' Vulnerability That was Silently Patched
https://blog.zecops.com/research/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/
#0day #ios #rce
Jamf
Jamf Threat Labs | Blog