12.6K subscribers
550 photos
27 videos
24 files
889 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.iss.one/APT_Notes/6

Chat Link:
t.iss.one/APT_Notes_PublicChat
Download Telegram
#job
About Wallarm
Join an exciting team that enjoys working and playing together. Wallarm is a well-funded technology startup in the San Francisco area. We continue to add new enterprise customers and grow our team. If you are bright, energetic, interested in cutting-edge tech, and want to make a difference in the company’s life, Wallarm is a place for you.

About the role
Are you someone that loves security and is a hacker at heart? Wallarm is looking for an eager and motivated Penetration Tester to join our Audit Security Team. This position will provide you the chance to work on identifying vulnerabilities across different software products and work collaboratively as part of the skilled and experienced pentest team.. If you have experience with penetration testing and a drive to learn check out below to learn more and apply!

What you will do
Develop and execute standard penetration tests to exploit vulnerabilities in the system.
Help ensure software security, communicate security vulnerabilities of all severities to all affected stakeholders within the product organization.

About you
3+ years of relevant experience (or an equivalent combination of education and experience sufficient to successfully perform the principal duties of the job)
Experience with penetration testing
Good critical thinking and problem solving skills
Attention to detail
Knowledge of security principles
Good collaboration skills, applied successfully within team as well as with other areas

Write in comments below, guys will write to you
🔥 Antivirus Bypass using Code Signing 🔥

Code signing is a method software publishers use to authenticate the programs they distribute to end-users. Basically, a code-signed program tells the end-user and an end-user’s computer that the program being installed/executed is from a legitimate software publisher.

Digitally signed malware can bypass system protection mechanisms that install or launch only programs with valid signatures

You can use the SignTool to sign file with a valid certificate Go Daddy.
For example:

signtool.exe sign /f t.iss.one_secdevoops.pfx /p "*Aspider#" /t https://timestamp.digicert.com .\yourfile
.exe

This allows you to digitally sign PE binaries such as .exe, .cab, .dll, .ocx, .msi, .xpi and .xap files.

Don't forget to share and subscribe

#av #bypass #ev #signing #code
t.iss.one_secdevoops.pfx
4.3 KB
Password: *Aspider#
Best SSRF bypass

https://127.1/
https://0000::1:80/
https://[::]:80/
https://2130706433/
https://[email protected]
https://0x7f000001/
https://017700000001
https://0177.00.00.01


#ssrf #bugbounty #bugbountytips
Cheat Sheet for Malware Analysis

MalAPI.io
Maps Windows APIs to common techniques used by malware.

Filesec.io
Stay up-to-date with the latest file extensions being used by attackers.

#redteam #blueteam #DFIR #windows #winapi #maldev
Django Debug Mode Bypass

https://target/login?next=/

https://target/admin
[301 to https://target/admin/login/?next=/admin/]

Change request to [POST]
[500 Django DEBUG mode and vary bad information]

#bugbounty #bugbountytips #bugbountytip
This media is not supported in your browser
VIEW IN TELEGRAM
LOLBAS Cmdl32.exe

It's like a new certutil.exe but absolutely unheard of by any antivirus software!
"C:\Windows\System32\Cmdl32.exe" (signed by MS) is for you.

#lolbin #lolbas
ScoutSuite

Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents a clear view of the attack surface automatically.

# https://github.com/nccgroup/ScoutSuite
# https://github.com/nccgroup/sadcloud

#aws #azure #gcp #auditing #tool
Forwarded from PT SWARM
How to exploit CVE-2021-40539 on ManageEngine ADSelfService Plus

👤 by Antoine Cervoise, Wilfried Bécard

ADSS offers multiple functionalities such as managing password policies for administrators or self password reset/account unlock for Active Directory users.
In this article research team explore the details of several vulnerabilities that allow an unauthenticated attacker to execute arbitrary code on the server.

📝 Contents:
• First steps
• Authentication Bypass
• Arbitrary file upload through the API
• Arguments injection
• Chaining everything together to get code execution
• Conclusion

https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html
RDP_DFIR.pdf
76.1 KB
Mindmap on RDP analysis

#mindmap #forensic #rdp