Using Kerberos for Authentication Relay Attacks
https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html
#kerberos #relay
https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html
#kerberos #relay
Blogspot
Using Kerberos for Authentication Relay Attacks
Posted by James Forshaw, Project Zero This blog post is a summary of some research I've been doing into relaying Kerberos authentica...
LFI Bypass
#bugbounty #bugbountytips #lfi
1) /usr/bin/cat /etc/passwd == /???/???/c?t$IFS/?t?/p?s?wd
2) /*/?at$IFS/???/???swd
3)/****/?at$IFS/???/*swd
4)/****/?at$IFS/???/*******swd
(IFS is Internal Field Separator = [space], [tab] or a [newline])#bugbounty #bugbountytips #lfi
SharpSystemTriggers
Collection of remote authentication triggers in C#
https://github.com/cube0x0/SharpSystemTriggers
#coerce #authentication #petitpotam #spoolsample #dcom
Collection of remote authentication triggers in C#
https://github.com/cube0x0/SharpSystemTriggers
#coerce #authentication #petitpotam #spoolsample #dcom
GitHub
GitHub - cube0x0/SharpSystemTriggers: Collection of remote authentication triggers in C#
Collection of remote authentication triggers in C# - GitHub - cube0x0/SharpSystemTriggers: Collection of remote authentication triggers in C#
Blue Team Notes
A collection of one-liners, small scripts, and some useful tips for blue team work.
https://github.com/Purp1eW0lf/Blue-Team-Notes
#blueteam #cheatsheet
A collection of one-liners, small scripts, and some useful tips for blue team work.
https://github.com/Purp1eW0lf/Blue-Team-Notes
#blueteam #cheatsheet
GitHub
GitHub - Purp1eW0lf/Blue-Team-Notes: You didn't think I'd go and leave the blue team out, right?
You didn't think I'd go and leave the blue team out, right? - GitHub - Purp1eW0lf/Blue-Team-Notes: You didn't think I'd go and leave the blue team out, right?
Thread Stack Spoofing
A PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based memory examination rules and better hide shellcodes while in-process memory.
https://github.com/mgeeky/ThreadStackSpoofer
#stackspoofing #av #evasion #inject #shellcode #bypass #edr
A PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based memory examination rules and better hide shellcodes while in-process memory.
https://github.com/mgeeky/ThreadStackSpoofer
#stackspoofing #av #evasion #inject #shellcode #bypass #edr
GitHub
GitHub - mgeeky/ThreadStackSpoofer: Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better…
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts. - mgeeky/ThreadStackSpoofer
Evading EDR with ScareCrow
ScareCrow - Payload creation framework designed around EDR bypass.
https://adamsvoboda.net/evading-edr-with-scarecrow/
https://www.grahamhelton.com/blog/scarecrow/
https://github.com/optiv/ScareCrow
#edr_evasion #shellcode_loader #syscalls
ScareCrow - Payload creation framework designed around EDR bypass.
https://adamsvoboda.net/evading-edr-with-scarecrow/
https://www.grahamhelton.com/blog/scarecrow/
https://github.com/optiv/ScareCrow
#edr_evasion #shellcode_loader #syscalls
Adam’s Blog
Evading EDR in 15 Minutes with ScareCrow
In an effort to keep this post short and sweet, this will be a brief explanation of a much more complex topic, but it's good to understand how EDR is det...
👍2
#job
About Wallarm
Join an exciting team that enjoys working and playing together. Wallarm is a well-funded technology startup in the San Francisco area. We continue to add new enterprise customers and grow our team. If you are bright, energetic, interested in cutting-edge tech, and want to make a difference in the company’s life, Wallarm is a place for you.
About the role
Are you someone that loves security and is a hacker at heart? Wallarm is looking for an eager and motivated Penetration Tester to join our Audit Security Team. This position will provide you the chance to work on identifying vulnerabilities across different software products and work collaboratively as part of the skilled and experienced pentest team.. If you have experience with penetration testing and a drive to learn check out below to learn more and apply!
What you will do
Develop and execute standard penetration tests to exploit vulnerabilities in the system.
Help ensure software security, communicate security vulnerabilities of all severities to all affected stakeholders within the product organization.
About you
3+ years of relevant experience (or an equivalent combination of education and experience sufficient to successfully perform the principal duties of the job)
Experience with penetration testing
Good critical thinking and problem solving skills
Attention to detail
Knowledge of security principles
Good collaboration skills, applied successfully within team as well as with other areas
Write in comments below, guys will write to you
About Wallarm
Join an exciting team that enjoys working and playing together. Wallarm is a well-funded technology startup in the San Francisco area. We continue to add new enterprise customers and grow our team. If you are bright, energetic, interested in cutting-edge tech, and want to make a difference in the company’s life, Wallarm is a place for you.
About the role
Are you someone that loves security and is a hacker at heart? Wallarm is looking for an eager and motivated Penetration Tester to join our Audit Security Team. This position will provide you the chance to work on identifying vulnerabilities across different software products and work collaboratively as part of the skilled and experienced pentest team.. If you have experience with penetration testing and a drive to learn check out below to learn more and apply!
What you will do
Develop and execute standard penetration tests to exploit vulnerabilities in the system.
Help ensure software security, communicate security vulnerabilities of all severities to all affected stakeholders within the product organization.
About you
3+ years of relevant experience (or an equivalent combination of education and experience sufficient to successfully perform the principal duties of the job)
Experience with penetration testing
Good critical thinking and problem solving skills
Attention to detail
Knowledge of security principles
Good collaboration skills, applied successfully within team as well as with other areas
Write in comments below, guys will write to you
InvisibilityCloak
Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project.
https://github.com/xforcered/InvisibilityCloak
#obfuscation #av #bypass
Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project.
https://github.com/xforcered/InvisibilityCloak
#obfuscation #av #bypass
GitHub
GitHub - xforcered/InvisibilityCloak: Proof-of-concept obfuscation toolkit for C# post-exploitation tools
Proof-of-concept obfuscation toolkit for C# post-exploitation tools - xforcered/InvisibilityCloak
🔥 Antivirus Bypass using Code Signing 🔥
Code signing is a method software publishers use to authenticate the programs they distribute to end-users. Basically, a code-signed program tells the end-user and an end-user’s computer that the program being installed/executed is from a legitimate software publisher.
Digitally signed malware can bypass system protection mechanisms that install or launch only programs with valid signatures
You can use the SignTool to sign file with a valid certificate Go Daddy.
For example:
Don't forget to share and subscribe
#av #bypass #ev #signing #code
Code signing is a method software publishers use to authenticate the programs they distribute to end-users. Basically, a code-signed program tells the end-user and an end-user’s computer that the program being installed/executed is from a legitimate software publisher.
Digitally signed malware can bypass system protection mechanisms that install or launch only programs with valid signatures
You can use the SignTool to sign file with a valid certificate Go Daddy.
For example:
signtool.exe sign /f t.iss.one_secdevoops.pfx /p "*Aspider#" /t https://timestamp.digicert.com .\yourfile
.exe
This allows you to digitally sign PE binaries such as .exe, .cab, .dll, .ocx, .msi, .xpi and .xap files.Don't forget to share and subscribe
#av #bypass #ev #signing #code
RID Hijacking: Maintaining access on Windows machines
https://r4wsecurity.blogspot.com/2017/12/rid-hijacking-maintaining-access-on.html
https://github.com/r4wd3r/RID-Hijacking
#rid #hijack
https://r4wsecurity.blogspot.com/2017/12/rid-hijacking-maintaining-access-on.html
https://github.com/r4wd3r/RID-Hijacking
#rid #hijack
Blogspot
RID Hijacking: Maintaining access on Windows machines
Read the full academic paper at ACM CCS CheckMATE 24 - Ghost in the SAM: Stealthy, Robust, and Privileged Persistence through Invisible Acc...
Best SSRF bypass
#ssrf #bugbounty #bugbountytips
https://127.1/
https://0000::1:80/
https://[::]:80/
https://2130706433/
https://[email protected]
https://0x7f000001/
https://017700000001
https://0177.00.00.01#ssrf #bugbounty #bugbountytips
Chrome Extensions for Bug Bounty Hunters
1) Wappalyzer
2) Shodan
3) HackTools
4) Penetration Testing Kit
5) Mitaka
6) HackerTarget
7) Snov.io
8) Hunter - Email Finder Extension
9) EditThisCookie
10) User-Agent Switcher
11) d3coder
12) Trufflehog
13) DotGit
14) Retire.js
# https://securitytrails.com/blog/bug-bounty-hunting-browser-extensions
#chrome #extensions #bugbounty
1) Wappalyzer
2) Shodan
3) HackTools
4) Penetration Testing Kit
5) Mitaka
6) HackerTarget
7) Snov.io
8) Hunter - Email Finder Extension
9) EditThisCookie
10) User-Agent Switcher
11) d3coder
12) Trufflehog
13) DotGit
14) Retire.js
# https://securitytrails.com/blog/bug-bounty-hunting-browser-extensions
#chrome #extensions #bugbounty
👍1