InfoSecTube
1.71K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
🛡RCE 0-day exploit found in log4j

💎Who is impacted?​
Cloud services like Steam, Apple iCloud, and apps like Minecraft have been found to be vulnerable to this exploit. Many, many others likely are, also.Anybody using Apache Struts is likely vulnerable
💎Temporary Mitigation​
Start your server with log4j2.formatMsgNoLookups set to true, or update to log4j-2.15.0-rc1 or later.

link

🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
🛡CVE-2021-42287/CVE-2021-42278 Weaponisation

💎So
on 9th November 2021, Cliff Fisher tweeted about a bunch of CVE's to do with Active Directory that caught a lot of people's eyes. These included CVE-2021-42278, CVE-2021-42291, CVE-2021-42287 and CVE-2021-42282. The one that caught my eye the most was CVE-2021-42287 as it related to PAC confusion and impersonation of domain controllers, also having just worked on PAC forging with Rubeus 2.0.

link

🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228

https://github.com/fullhunt/log4j-scan

🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
🛡Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

link

🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
What causes the Log4Shell vulnerability?
Log4j2 supports by default a logging feature called “Message Lookup Substitution”. This feature enables certain special strings to be replaced, at the time of logging, by other dynamically-generated strings.
This means that if any part of a logged string can be controlled by a remote attacker, the remote attacker gains remote code execution on the application that logged the string.

Why is Log4Shell so dangerous?
The
vulnerability, which received the highest CVSS score possible – 10.0 – is extremely dangerous due to a number of factors:

Exploitation of the vulnerability is trivial and persistent, with tons of weaponized exploits available on GitHub and other public sources.
Log4j2 is one of the most popular Java logging frameworks. There are currently almost 7,000 Maven artifacts that depend on log4j-core (the vulnerable artifact), and there are countless others Java projects that use it.
🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
درک کلاس های کدهای وضعیت HTTP
کدهای وضعیت HTTP به 5 دسته، کلاس یا سطح تقسیم می شوند.
کلاس 100: این کدهای شامل اطلاعای هستند که نشان می دهد درخواست شروع شده توسط مرورگر در حال اجرا و ادامه است.

کلاس 200: وقتی که درخواست مرورگر دریافت شده است و توسط سرور پردازش بشود نتیجه موفقت آمیز به همراه یکی از کدهای این کلاس برگردانده می شود.

کلاس 300: وقتی آدرس درخواستی توسط آدرس جدید جایگزین شده باشد کدهای ریدارکت یا بازگشتی که مربوط به این کلاس هستند برگردانده می شود.

کلاس 400: وقتی کدهای خطای کلاینت اتفاق می افتند نشا می دهد که مشکلی در درخواست رخ داده است که عامل بروز آن مشکل کلاینت یا مروگر است.

کلاس 500: وقتی هم که کدهای خطای سرور برگردانده می شود میفهمیم که درخواست پذیرفته شده اما یک خطا روی خود سرور از تکمیل درخواست جلوگیری کرده است.
🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
🤖A robust and rapidly-deployable Red Team proxy with strong OPSEC considerations.

Description
:
Generally, Red Teams and adversary's redirect their traffic through proxies to protect their backend infrastructure. GoWard proxies HTTP C2 traffic to specified Red Team servers based on the HTTP header of the traffic.

GoWard's intent is to help obfuscate Red Team traffic and provide some level of resiliency against Blue Team investigation and mitigation.

https://github.com/chdav/GoWard

🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
#web #burp #trick

🛡Send traffic from VPS to local Burp

You can send requests from your remote server to your local BURP using SSH. To do this, it is enough to perform port forwarding when connecting. Those who play CTF are probably familiar with this.

It is enough to connect to your VPS using the command:

ssh -R 8080:127.0.0.1:8080 root@VPS_IP -f -N

Now on the VPS you can run anything with a proxy and the traffic will go through your local Burp:

curl https://example.com -x https://127.0.0.1:8080

🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
👍2