Windows Command-Line Obfuscation
Many Windows applications have multiple ways in which the same command line can be expressed, usually for compatibility or ease-of-use reasons. As a result, command-line arguments are implemented inconsistently making detecting specific commands harder due to the number of variations. This post shows how more than 40 often-used, built-in Windows applications are vulnerable to forms of command-line obfuscation, and presents a tool for analysing other executables.
# https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation
#cheatsheet #cmd #pentest
Many Windows applications have multiple ways in which the same command line can be expressed, usually for compatibility or ease-of-use reasons. As a result, command-line arguments are implemented inconsistently making detecting specific commands harder due to the number of variations. This post shows how more than 40 often-used, built-in Windows applications are vulnerable to forms of command-line obfuscation, and presents a tool for analysing other executables.
# https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation
#cheatsheet #cmd #pentest
www.wietzebeukema.nl
Windows Command-Line Obfuscation
Many Windows applications have multiple ways in which the same command line can be expressed, usually for compatibility or ease-of-use reasons. As a result, command-line arguments are implemented inconsistently making detecting specific commands harder due…
#BurpHacksForBounties - Day 22/30
🤓🤓 Create your own Burp Extender Plugin in 3 tweets with Java.
Thank you Burp Suite for making it easy
#infosec #appsec #burp @BurpSuiteGuide #bugbountytips #bugbountytip #security
🤓🤓 Create your own Burp Extender Plugin in 3 tweets with Java.
Thank you Burp Suite for making it easy
#infosec #appsec #burp @BurpSuiteGuide #bugbountytips #bugbountytip #security
1/n [JAVA]
- Download API interfaces from Burp -> Extender -> APIs -> Save Interface files.
- Create a package name burp and save files there, you can choose any IDE of your choice.
- Make IDE ready to build JAR.
- Create file name BurpExtender and add the following code.
- Download API interfaces from Burp -> Extender -> APIs -> Save Interface files.
- Create a package name burp and save files there, you can choose any IDE of your choice.
- Make IDE ready to build JAR.
- Create file name BurpExtender and add the following code.
2/n
- File name Burp Extender will be an entry point for your plugin, Extending interface registers this in Burp on loading. All logic for the plugin goes here.
- Build Jar
- Load Jar in Burp.
- File name Burp Extender will be an entry point for your plugin, Extending interface registers this in Burp on loading. All logic for the plugin goes here.
- Build Jar
- Load Jar in Burp.
3/n
- You can also build Jar from the command line with these commands.
Code location -> cd usercode
loc for *.class files -> mkdir build
location for jar -> mkdir bin
Compile code -> javac -d build src/burp/*.java
Build Jar -> jar cf bin/burpextender.jar -C build burp
- You can also build Jar from the command line with these commands.
Code location -> cd usercode
loc for *.class files -> mkdir build
location for jar -> mkdir bin
Compile code -> javac -d build src/burp/*.java
Build Jar -> jar cf bin/burpextender.jar -C build burp
OFFENSIVE SECURITY CHEATSHEET
— Open Source Intelligence (OSINT)
— Web Pentest
— Network
— Shells methods
— Windows Systems
— Linux Systems
— Other Systems
— Passcracking Hash & Files
— Phishing, RedTeam and SE
— Wireless
— Cryptography
— Pwn
— External Resources
https://cheatsheet.haax.fr/
#cheatsheet #pentest #osint #ad
— Open Source Intelligence (OSINT)
— Web Pentest
— Network
— Shells methods
— Windows Systems
— Linux Systems
— Other Systems
— Passcracking Hash & Files
— Phishing, RedTeam and SE
— Wireless
— Cryptography
— Pwn
— External Resources
https://cheatsheet.haax.fr/
#cheatsheet #pentest #osint #ad
Top 25 Penetration Testing Skills and Competencies (Detailed)
What soft skills and technical competencies does it take to became a professional penetration tester or ethical hacker? In this article we will discuss in detail what are the top 25 areas every pentester should be familiar with and what skills you should focus on if you want to become a professional penetration tester.
https://www.infosecmatter.com/top-25-penetration-testing-skills-and-competencies-detailed/
#pentest #skills
What soft skills and technical competencies does it take to became a professional penetration tester or ethical hacker? In this article we will discuss in detail what are the top 25 areas every pentester should be familiar with and what skills you should focus on if you want to become a professional penetration tester.
https://www.infosecmatter.com/top-25-penetration-testing-skills-and-competencies-detailed/
#pentest #skills
InfosecMatter
Top 25 Penetration Testing Skills and Competencies (Detailed) - InfosecMatter
List of 25 penetration testing skills every professional penetration tester or ethical hacker should have. Also applicable to red teamers and security auditors.
Awesome Extensions : https://github.com/snoopysecurity/awesome-burp-extensions
Awesome Burp Shortcut cheetsheat : https://www.sans.org/posters/burp-suite-cheat-sheet/ by
@ChrisADale
Simple config : https://gist.github.com/jgamblin/104f15a265e2ab007bae19cb37aa606d by
@jgamblin
Awesome Burp Shortcut cheetsheat : https://www.sans.org/posters/burp-suite-cheat-sheet/ by
@ChrisADale
Simple config : https://gist.github.com/jgamblin/104f15a265e2ab007bae19cb37aa606d by
@jgamblin
GitHub
GitHub - snoopysecurity/awesome-burp-extensions: A curated list of amazingly awesome Burp Extensions
A curated list of amazingly awesome Burp Extensions - snoopysecurity/awesome-burp-extensions
This media is not supported in your browser
VIEW IN TELEGRAM
#BurpHacksForBounties - Day 24/30
This is an amazing writeup which talks about using plugin in Burp that ease the journey for catching IDORs.
Writeup link: https://infosecwriteups.com/leveraging-burp-suite-extension-for-finding-idor-insecure-direct-object-reference-2653f9b89fd4
By
@dhanush
#infosec #appsec #bugbountytips #bugbountytip #bugbounty #security
This is an amazing writeup which talks about using plugin in Burp that ease the journey for catching IDORs.
Writeup link: https://infosecwriteups.com/leveraging-burp-suite-extension-for-finding-idor-insecure-direct-object-reference-2653f9b89fd4
By
@dhanush
#infosec #appsec #bugbountytips #bugbountytip #bugbounty #security
Fantastic Windows Logon types and Where to Find Credentials in Them
https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them
#windwows #credential
https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them
#windwows #credential
Altered Security
Fantastic Windows Logon types and Where to Find Credentials in Them
Hello All,In this blog post we will explore and learn about various Windows Logon Types and understand how are these logon type events are generated. We will also see if we can extract credentials from individual logon types. We will be using our Active Directory…
#BurpHacksForBounties - Day 25/30
Optimizing Burp Suite for better performance, these 4 simple steps and you would notice a big difference in performance.
#infosec #appsec #burp #security #bugbountytips #bugbounty
Optimizing Burp Suite for better performance, these 4 simple steps and you would notice a big difference in performance.
#infosec #appsec #burp #security #bugbountytips #bugbounty
RemotePotato — Updated version (Cross session activation)
https://github.com/antonioCoco/RemotePotato0
#windows #privesc #lpe #pentest
https://github.com/antonioCoco/RemotePotato0
#windows #privesc #lpe #pentest
GitHub
GitHub - antonioCoco/RemotePotato0: Windows Privilege Escalation from User to Domain Admin.
Windows Privilege Escalation from User to Domain Admin. - antonioCoco/RemotePotato0