Forwarded from 1N73LL1G3NC3
100 Methods for Container Attacks(RTC0010)
Container escape, tampering, insecure orchestration and etc.
Container escape, tampering, insecure orchestration and etc.
🔥5❤🔥4❤1
🔥 Shodan is giving away a $5 Membership subscription
The sale lasts until July 17 23:59 UTC
https://twitter.com/shodanhq/status/1680723526494609409
The sale lasts until July 17 23:59 UTC
https://twitter.com/shodanhq/status/1680723526494609409
Пора пилить свой Shodan ^_^
🔥4
⛓ Divide and Rule — AMSI Bypass
By spliiting well known PowerShell scripts, e.g. an AMSI Bypass, we can directly bypass Windows Defender or get at least the line, where the detection occurs. Outcome: Several AMSI Bypasses and two scripts:
- One to split PowerShell snippets in multiple lines
- A second script to run all the files in an Oneliner, XOR obfuscated
https://badoption.eu/blog/2023/07/15/divideconqer.html
#amsi #av #bypass #powershell
By spliiting well known PowerShell scripts, e.g. an AMSI Bypass, we can directly bypass Windows Defender or get at least the line, where the detection occurs. Outcome: Several AMSI Bypasses and two scripts:
- One to split PowerShell snippets in multiple lines
- A second script to run all the files in an Oneliner, XOR obfuscated
https://badoption.eu/blog/2023/07/15/divideconqer.html
#amsi #av #bypass #powershell
❤7👍1
Forwarded from cobaltstrike
Run BOFs written for Cobalt Strike in Brute Ratel C4
https://blog.nviso.eu/2023/07/17/introducing-cs2br-pt-ii-one-tool-to-port-them-all/
https://github.com/NVISOsecurity/cs2br-bof
https://blog.nviso.eu/2023/07/17/introducing-cs2br-pt-ii-one-tool-to-port-them-all/
https://github.com/NVISOsecurity/cs2br-bof
NVISO Labs
Introducing CS2BR pt. II – One tool to port them all
Introduction In the previous post of this series we showed why Brute Ratel C4 (BRC4) isn’t able to execute most BOFs that use the de-facto BOF API standard by Cobalt Strike (CS): BRC4 impleme…
👍4🔥1
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Если есть привилегия SeTcbPrivilege (а локальный админ может ее активировать), то можно запросить TGS билет для любого авторизованного в системе пользователя без указания его пароля. Интересный сценарий...
https://github.com/foxlox/GIUDA
#ad #pentest #redteam #soft #git
https://github.com/foxlox/GIUDA
#ad #pentest #redteam #soft #git
GitHub
GitHub - foxlox/GIUDA: Ask a TGS on behalf of another user without password
Ask a TGS on behalf of another user without password - foxlox/GIUDA
🔥7👍3
Forwarded from 1N73LL1G3NC3
TGSThief
I think a lot of people have seen the project GIUDA . It is an interesting way to get the TGS of a user whose logon session is just present on the computer. The problem is that its code is written in Pascal, so I had to rewrite the project in C++.
How to use:
Just run the tool and select the desired logon session! The tool will automatically escalate privileges and request a TGS.
Advantages:
- We do not need to run the code on behalf of the system. Run the program as a local administrator, the privilege escalation will happen automatically.
- I also added SPN validation through regex, so there is less chance of making a mistake and not getting TGS.
- The TGS ticket is optionally injected into the logon session where the tool is running. The TGS ticket is simply output in base64 for convenience, and only embedded if required.
- It is not necessary to run the tool ten times to see the LUID. You can now select the LUID you want from the drop down list.
Thanks to: @Michaelzhm
I think a lot of people have seen the project GIUDA . It is an interesting way to get the TGS of a user whose logon session is just present on the computer. The problem is that its code is written in Pascal, so I had to rewrite the project in C++.
How to use:
Just run the tool and select the desired logon session! The tool will automatically escalate privileges and request a TGS.
Advantages:
- We do not need to run the code on behalf of the system. Run the program as a local administrator, the privilege escalation will happen automatically.
- I also added SPN validation through regex, so there is less chance of making a mistake and not getting TGS.
- The TGS ticket is optionally injected into the logon session where the tool is running. The TGS ticket is simply output in base64 for convenience, and only embedded if required.
- It is not necessary to run the tool ten times to see the LUID. You can now select the LUID you want from the drop down list.
Thanks to: @Michaelzhm
🔥6👍3❤🔥2
This media is not supported in your browser
VIEW IN TELEGRAM
🔨KRBUACBypass
By adding a
Research:
https://www.tiraniddo.dev/2022/03/bypassing-uac-in-most-complex-way.html
Source:
https://github.com/wh0amitz/KRBUACBypass
#ad #kerberos #uac #bypass
By adding a
KERB-AD-RESTRICTION-ENTRY to the service ticket, but filling in a fake MachineID, we can easily bypass UAC and gain SYSTEM privileges.Research:
https://www.tiraniddo.dev/2022/03/bypassing-uac-in-most-complex-way.html
Source:
https://github.com/wh0amitz/KRBUACBypass
#ad #kerberos #uac #bypass
👍7
Ⓜ️ Metabase Pre-auth RCE
Earlier this week, it was reported that Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 has a vulnerability that allows attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. This vulnerability was designated as CVE-2023-38646.
Research:
https://blog.calif.io/p/reproducing-cve-2023-38646-metabase
PoC:
https://gist.github.com/testanull/a7beb2777bbf550f3cf533d2794477fe
#metabase #cve #poc #rce
Earlier this week, it was reported that Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 has a vulnerability that allows attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. This vulnerability was designated as CVE-2023-38646.
Research:
https://blog.calif.io/p/reproducing-cve-2023-38646-metabase
PoC:
https://gist.github.com/testanull/a7beb2777bbf550f3cf533d2794477fe
#metabase #cve #poc #rce
🔥8👍1
This media is not supported in your browser
VIEW IN TELEGRAM
🍅 S4UTomato — Escalate Service Account To LocalSystem via Kerberos
Learn how to leverage Kerberos for privilege escalation in a Windows domain environment using virtual accounts with the help of Resource-based Constrained Delegation, Shadow Credentials, and Tgtdeleg techniques.
https://github.com/wh0amitz/S4UTomato
#ad #privesc #kerberos #windows
Learn how to leverage Kerberos for privilege escalation in a Windows domain environment using virtual accounts with the help of Resource-based Constrained Delegation, Shadow Credentials, and Tgtdeleg techniques.
https://github.com/wh0amitz/S4UTomato
#ad #privesc #kerberos #windows
🔥5👍1
Forwarded from 1N73LL1G3NC3
D1rkInject
Another approach of Threadless injection that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
Another approach of Threadless injection that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
GitHub
GitHub - SaadAhla/D1rkInject: Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into…
Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory stat...
👍6
Forwarded from 𝖝𝖓𝖝 𝖘𝖔𝖋𝖙𝖜𝖆𝖗𝖊 𝖋𝖔𝖚𝖓𝖉𝖆𝖙𝖎𝖔𝖓
Буквально недавно OWASP выкатили релиз Security Top 10 для API. Измения не сильно большие, нарисовала картиночку для наглядности 😈
Подробности в доках https://owasp.org/API-Security/editions/2023/en/0x00-notice/
🥰 всем пис 🥰
Подробности в доках https://owasp.org/API-Security/editions/2023/en/0x00-notice/
Please open Telegram to view this post
VIEW IN TELEGRAM
❤9
🐕 BloodHound CE: A New Era!
Discover the latest update of BloodHound - now called BloodHound Community Edition (CE). Here's what you need to know:
🚀 Key Features:
— Enhanced GUI for a user-friendly experience
— New containerized architecture for streamlined deployment
— Cached query results for boosted performance
— User management, multi-factor authentication, and SAML authentication
More about it
https://posts.specterops.io/bloodhound-community-edition-a-new-era-d64689806e90
#ad #bloodhound
Discover the latest update of BloodHound - now called BloodHound Community Edition (CE). Here's what you need to know:
🚀 Key Features:
— Enhanced GUI for a user-friendly experience
— New containerized architecture for streamlined deployment
— Cached query results for boosted performance
— User management, multi-factor authentication, and SAML authentication
More about it
https://posts.specterops.io/bloodhound-community-edition-a-new-era-d64689806e90
#ad #bloodhound
🔥7👍3❤🔥2❤2
🔐 Exploiting SCCM’s AdminService API for Site Takeover 🔐
Extensive research into SCCM services has revealed a security flaw within the AdminService API, exploiting the authentication process and leading to unauthorized access. The AdminService API, backed by Microsoft Negotiate authentication, could be leveraged by malicious actors for privilege escalation, granting unauthorized Full Administrator privileges on the targeted site.
🌐 Details:
https://posts.specterops.io/site-takeover-via-sccms-adminservice-api-d932e22b2bf
#ad #sccm #site #takeover
Extensive research into SCCM services has revealed a security flaw within the AdminService API, exploiting the authentication process and leading to unauthorized access. The AdminService API, backed by Microsoft Negotiate authentication, could be leveraged by malicious actors for privilege escalation, granting unauthorized Full Administrator privileges on the targeted site.
🌐 Details:
https://posts.specterops.io/site-takeover-via-sccms-adminservice-api-d932e22b2bf
#ad #sccm #site #takeover
Medium
Site Takeover via SCCM’s AdminService API
tl:dr: The SCCM AdminService API is vulnerable to NTLM relaying and can be abused for SCCM site takeover.
🔥8👍1
🛠 From C to Shellcode: Crafting Position-Independent Code
Ever wondered how malware developers create shellcode? Dive into the world of Position-Independent Code (PIC) and learn about a shellcode development method using MinGW. This approach combines assembly and C to create efficient and stealthy payloads.
🌐 Details:
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode
#maldev #clang #shellcode #asssembly
Ever wondered how malware developers create shellcode? Dive into the world of Position-Independent Code (PIC) and learn about a shellcode development method using MinGW. This approach combines assembly and C to create efficient and stealthy payloads.
🌐 Details:
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode
#maldev #clang #shellcode #asssembly
steve-s.gitbook.io
From C, with inline assembly, to shellcode | 0xTriboulet
Friday, August 11, 2023
👍3
Forwarded from Cybred
Black Hat USA 2023
Schedule
Presentations
DEF CON 31
Schedule
Presentations
Расписание (с описанием докладов) и презентации с Black Hat USA 2023 & DEF CON 31
Schedule
Presentations
DEF CON 31
Schedule
Presentations
Расписание (с описанием докладов) и презентации с Black Hat USA 2023 & DEF CON 31
❤4
🐧 Linux Kernel Syscalls
Very useful website if you need a quick reference to Linux kernel syscalls (numbers and parameters for various architectures and kernel versions)
🌐 Details:
https://syscalls.mebeim.net/
#linux #kernel #syscall
Very useful website if you need a quick reference to Linux kernel syscalls (numbers and parameters for various architectures and kernel versions)
🌐 Details:
https://syscalls.mebeim.net/
#linux #kernel #syscall
🔥8❤1
Forwarded from Offensive Xwitter
Шпаргалка по быстрому развертыванию старой Убунты
Зачем? Статистика не врет – бо́льшая часть проломов с внешки начинается с дырявого веба. Веб же, в основном, крутится на *NIX-ах, и чаще всего, нажесть как не до конца обновленных. К сожалению (нет, на самом деле, к частью) , реал-лайф отличается от CTF-таска, поэтому нестандартного SUID-ника / сплойтабельной cron-задачи / нестойкого
Однако, предвосхищая контраргументы на тему небезопасности их применения, ядерные уязвимости требуют бережного использования в проде. Обычно под этим подразумевается предварительное тестирование оных на подготовленном стенде с продовым сетапом (ревизия ОС, версия ядра). На примере Убунты покажем, как быстро задеплоить такой стенд.
1. Смотрим ОС и ядро на таргете:
3. Меняем репозитории системных пакетов на архивные:
P. S. Если версия ОСи достаточно старая, чтобы libssl не дал скачать сорцы с Гитхаба с помощью wget/curl (i. e., не поддерживает хотя бы TLSv1.2), репозитории можно клонировать, отключив в клиенте гита проверку SSL-ей (для гетов/курлов такое не прокатит – все равно обосрутся):
Зачем? Статистика не врет – бо́льшая часть проломов с внешки начинается с дырявого веба. Веб же, в основном, крутится на *NIX-ах, и чаще всего, на
sudo -l правила найти удается далеко не всегда, а залутаться от рута ой как хочется. Следовательно, если сходу не взлетает PwnKit, linPEAS (по секрету) запускать никто не будет, ведь ядерным сплоитом проще и быстрее.Однако, предвосхищая контраргументы на тему небезопасности их применения, ядерные уязвимости требуют бережного использования в проде. Обычно под этим подразумевается предварительное тестирование оных на подготовленном стенде с продовым сетапом (ревизия ОС, версия ядра). На примере Убунты покажем, как быстро задеплоить такой стенд.
1. Смотрим ОС и ядро на таргете:
$ cat /etc/os-release2. Идем на old-releases.ubuntu.com и хватаем нужный ISO-шник торрентом, разворачиваем на ВМ.
$ uname -a
3. Меняем репозитории системных пакетов на архивные:
$ sudo sed -i -re 's/([a-z]{2}\.)?archive.ubuntu.com|security.ubuntu.com/old-releases.ubuntu.com/g' /etc/apt/sources.list
$ sudo apt-get update
4. Накатываем нужное ядро:$ sudo apt-get install linux-image-$(uname -r)5. Правим настройки GRUB, чтобы при загрузке иметь возможность свичнуть ядро:
$ gksudo gedit /etc/default/grub6. Ставим метапакеты компиляции и gcc-multilib на случай, если древний сплоит будет собираться с
--> GRUB_TIMEOUT=-1
--> #GRUB_HIDDEN_TIMEOUT=0
$ sudo update-grub
$ sudo reboot # (on boot select the kernel from "Previous Linux versions")
-m32:$ sudo apt-get install build-essential gcc-multilibВ среднем процесс занимает не более 15 минут вместе с загрузкой образа и адаптацией команд выше под тестируемый дистрибутив.
P. S. Если версия ОСи достаточно старая, чтобы libssl не дал скачать сорцы с Гитхаба с помощью wget/curl (i. e., не поддерживает хотя бы TLSv1.2), репозитории можно клонировать, отключив в клиенте гита проверку SSL-ей (для гетов/курлов такое не прокатит – все равно обосрутся):
$ export GIT_SSL_NO_VERIFY=1
$ git clone https://github.com/<EXP_AUTHOR>/<EXP_REPO>
👍4
🪄 Red Wizard
This tool automates the deployment of a comprehensive infrastructure with redirectors, backend systems, phishing relays, OSINT machines, and more. It is designed to be user-friendly, providing wizards to walk administrators and Red Team operators through the deployment process. The infrastructure is also self-documenting, making the sharing of all relevant details to the team of operators an effortless task.
🌐 Details:
https://www.secura.com/blog/red-wizard-1
#redteam #relay #infrastructure #phishing
This tool automates the deployment of a comprehensive infrastructure with redirectors, backend systems, phishing relays, OSINT machines, and more. It is designed to be user-friendly, providing wizards to walk administrators and Red Team operators through the deployment process. The infrastructure is also self-documenting, making the sharing of all relevant details to the team of operators an effortless task.
🌐 Details:
https://www.secura.com/blog/red-wizard-1
#redteam #relay #infrastructure #phishing
🔥4
This media is not supported in your browser
VIEW IN TELEGRAM
⚛️ Nuclei Templates AI Generator
Nuclei Template Editor - AI-powered hub to create, debug, scan, and store templates. Covering a wide array of vulnerabilities using public templates & rich CVE data.
📝 Note:
Current focus is HTTP, more protocols coming soon
🌐 Source:
https://templates.nuclei.sh
https://docs.nuclei.sh/editor
#nuclei #template #generator
Nuclei Template Editor - AI-powered hub to create, debug, scan, and store templates. Covering a wide array of vulnerabilities using public templates & rich CVE data.
📝 Note:
Current focus is HTTP, more protocols coming soon
🌐 Source:
https://templates.nuclei.sh
https://docs.nuclei.sh/editor
#nuclei #template #generator
🔥14❤🔥3❤3
Forwarded from RedTeam brazzers (Миша)
Недавно нашел интересную функцию DebugActiveProcess , которая позволяет текущему процессу стать дебаггером (обрабатывать всякие дебаг события) для другого процесса. Ну и в голову пришла идея: "А что если применить это на powershell и обрабатывать LOAD_DLL_DEBUG_EVENT, перехватывать загрузку amsi.dll и патчить ее на лету?" . Таким образом родился проект DebugAmsi , который позволяет запускать процесс powershell.exe с автоматическим патчем amsi. Причем я постарался избавить Вас от нужды чистки строк, обфускации их и прочей жести. В файлике strhide реализован алгоритм по шифрованию всех строк проекта во время компиляции с помощью XOR. Алгоритм вынесен в два отдельных милых макроса -
Пользуйтесь на здоровье😚
h() (для шифрования ASCII строк) и hW() (для шифрования юникода). Пользуйтесь на здоровье😚
❤🔥12👍3🔥1