12.5K subscribers
550 photos
27 videos
24 files
889 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.iss.one/APT_Notes/6

Chat Link:
t.iss.one/APT_Notes_PublicChat
Download Telegram
Forwarded from 1N73LL1G3NC3
certsync

certsync is a new technique in order to dump NTDS remotely, but this time without DRSUAPI: it uses golden certificate and UnPAC the hash. It works in several steps:
1) Dump user list, CA informations and CRL from LDAP
2) Dump CA certificate and private key
3) Forge offline a certificate for every user
4) UnPAC the hash for every user in order to get nt and lm hashes
👍6
Forwarded from Offensive Xwitter
Псс, гайс, слышали об уязвимости CVE-2022-48109? Вот и я нет до сегодняшнего дня, а ведь это CVE ID моего инфосек-братишки @Acrono! Хочу первым поздравить Пашу с потерей цвйешной девственности – ура-ура! Ждем от него покорения новых вершин на поприще киберсесурити 💪🏻

Следите за каналом @APT_Notes, чтобы узнать подробности 😉
🔥213
This media is not supported in your browser
VIEW IN TELEGRAM
🔧 Windows LPE via StorSvc Service

StorSvc is a service which runs as NT AUTHORITY\SYSTEM and tries to load the missing SprintCSP.dll DLL when triggering the SvcRebootToFlashingMode RPC method locally.

PoC:
https://github.com/blackarrowsec/redteam-research/tree/master/LPE%20via%20StorSvc

#windows #lpe #storsvc #service
🔥5👍1
⚙️ Joomla Web Service Endpoint Access (CVE-2023-23752)

An issue was discovered in Joomla 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

PoC:
httpx -l targets.txt -sc -ct -ip -path '/api/index.php/v1/config/application?public=true' 

Research:
https://unsafe.sh/go-149780.html

Nuclei Template:
https://github.com/thecyberneh/nuclei-templatess/blob/main/cves/2023/CVE-2023-23752.yaml

#joomla #endpoint #access #cve
👍9
🔥 NimPlant С2

This is a new light-weight, first-stage C2 implant written in Nim, with a supporting Python server and Next.JS web GUI.

https://github.com/chvancooten/NimPlant

#c2 #nim #python #redteam
🔥9
🧪 NtQueueApcThreadEx — NTDLL Gadget Injection

This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.

Source:
https://github.com/LloydLabs/ntqueueapcthreadex-ntdll-gadget-injection

#apc #ntdll #injection #clang #redteam
🔥5👍1
💥 Fortinet FortiNAC Unauthenticated RCE

On Thursday, 16 February 2022, Fortinet released a PSIRT that details CVE-2022-39952, a critical vulnerability affecting its FortiNAC product. This vulnerability, discovered by Gwendal Guégniaud of Fortinet, allows an unauthenticated attacker to write arbitrary files on the system and as a result obtain remote code execution in the context of the root user.

PoC:
https://github.com/horizon3ai/CVE-2022-39952

Research:
https://www.horizon3.ai/fortinet-fortinac-cve-2022-39952-deep-dive-and-iocs/

#fortinet #fortinac #rce #cve
🔥4👍21
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Это реально круто!

Вкратце: позволяет записывать файлы, созданные маяком кобальта (на примере кобальта), в память, а не на диск в системе.

https://github.com/Octoberfest7/MemFiles

#redteam #pentest #git #cs #bypass
👍7
📜 Abusing Code Signing Certificates

Abusing code signing certificates is not new. In the past few years alone, it has proven to be an effective method of bypassing certain security controls to allow malicious software to run and look seemingly benign. This article describes code signing methods, as well as tools for copying the signature from legitimate PE files.

Source:
https://axelarator.github.io/posts/codesigningcerts/

#sign #code #certificate #abuse #redteam
🔥5👍2
​​​⚛️ AtomLdr

A DLL loader with advanced evasive.

Features:
• DLL unhooking from \KnwonDlls\ directory, with no RWX sections
• The encrypted payload is saved in the resource section and retrieved via custom code
• AES256-CBC Payload encryption using custom no table/data-dependent branches using ctaes; this is one of the best custom AES implementations I've encountered
• Indirect syscalls, utilizing HellHall with ROP gadgets
• Payload injection using APC calls - alertable thread
• Api hashing using two different implementations of the CRC32 string hashing algorithm
• The total Size is 17kb

https://github.com/NUL0x4C/AtomLdr

#loader #dll #edr #evasion #redteam
🔥7👍3
🌐 DroppedConnection — Cisco ASA Anyconnect Emulator

Fake VPN server that captures credentials and executes code via the Cisco AnyConnect client.

Source:
https://github.com/nccgroup/DroppedConnection

Research:
https://research.nccgroup.com/2023/03/01/making-new-connections-leveraging-cisco-anyconnect-client-to-drop-and-run-payloads/

#cisco #asa #anyconnect #credentials #redteam
🔥12👍3
🔑 KeePass2: DLL Hijacking and Hooking API

This new article about a way to get the Master Password of a KeePass database.

https://skr1x.github.io/keepass-dll-hijacking/

#keepass #dll #hijacking #redteam
👍8😁1
Forwarded from 1N73LL1G3NC3
This media is not supported in your browser
VIEW IN TELEGRAM
LPE exploit for CVE-2023-21768
(Windows Ancillary Function Driver for WinSock Elevation of Privilege)

Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems.
👍5
🔥3
🦛 PetitPotam: Local Privilege Escalation

Now PetitPotato can elevate to SYSTEM on the latest windows.
My test version is 10.0.20348.1547

https://github.com/wh0amitz/PetitPotato/

#windows #privesc #rpc #petitpotam
👍8
Forwarded from Offensive Xwitter
👹 [ snovvcrash, sn🥶vvcr💥sh ]

Have been playing around with Domain Fronting via Fastly and discovered that you actually do not need to confirm the domain name ownership (by adding a CNAME) for the traffic to flow towards your IP. A bug or feature? 🤔

🐥 [ tweet ]

игрались тут с @Acrono с домен фронтингом и вот такую фичу интересную нашли
👍4