π [ HackingLZ, Justin ]
So they updated the advisory with a patch/replacement for a single file which is great...However I would suspect it won't take a lot of work to diff old vs new? Incoming PoC?
https://t.co/4lbxkVc1Ja
π https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
π₯ [ tweet ]
So they updated the advisory with a patch/replacement for a single file which is great...However I would suspect it won't take a lot of work to diff old vs new? Incoming PoC?
https://t.co/4lbxkVc1Ja
π https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
π₯ [ tweet ]
π [ hackinarticles, Hacking Articles ]
Active Directory Penetration Testing
https://t.co/D4pKsnC9Yk
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities #bugbounty
π https://www.hackingarticles.in/red-teaming/
π₯ [ tweet ]
Active Directory Penetration Testing
https://t.co/D4pKsnC9Yk
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities #bugbounty
π https://www.hackingarticles.in/red-teaming/
π₯ [ tweet ]
π [ theluemmel, S4U2LuemmelSec ]
Just pushed a little update to the relay / MitM blog again.
This time NTLM Downgrade attacks.
https://t.co/R7PRhcQ37F
If successfull, you can afterwards nicely do pass the hash attacks with you new NT hash :)
π https://luemmelsec.github.io/Relaying-101/#ntlm-downgrade-attack
π₯ [ tweet ]
Just pushed a little update to the relay / MitM blog again.
This time NTLM Downgrade attacks.
https://t.co/R7PRhcQ37F
If successfull, you can afterwards nicely do pass the hash attacks with you new NT hash :)
π https://luemmelsec.github.io/Relaying-101/#ntlm-downgrade-attack
π₯ [ tweet ]
π [ ReconOne_, ReconOne ]
Did you hear about new Confluence CVE-2022-26134 Remote Code Execution? Try to quickly cover your Attack Surface with the help of nuclei π
#Confluence #reconone #recon #attacksurface #cve2022 #nuclei #bugbountytips
π₯ [ tweet ]
Did you hear about new Confluence CVE-2022-26134 Remote Code Execution? Try to quickly cover your Attack Surface with the help of nuclei π
#Confluence #reconone #recon #attacksurface #cve2022 #nuclei #bugbountytips
π₯ [ tweet ]
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
Based on @ippsecβs video, Iβve added two more examples on manual parsing JSONs produced by #BloodHound collectors:
1. List all members of a group (recursively).
2. List all groups which the user is a member of (recursively).
https://t.co/20cL7rms4a
π https://ppn.snovvcrash.rocks/pentest/infrastructure/ad#manual-json-parsing
π₯ [ tweet ]
Based on @ippsecβs video, Iβve added two more examples on manual parsing JSONs produced by #BloodHound collectors:
1. List all members of a group (recursively).
2. List all groups which the user is a member of (recursively).
https://t.co/20cL7rms4a
π https://ppn.snovvcrash.rocks/pentest/infrastructure/ad#manual-json-parsing
π₯ [ tweet ]
π [ 0xdf_, 0xdf ]
Timing from @hackthebox_eu had LFI, directory traversal, a side channel/timing attack, a mass assignment vulnerability, LFI+upload = RCE, and a custom downloader to exploit, all on the way to root.
https://t.co/QHYKm3OnLU
π https://0xdf.gitlab.io/2022/06/04/htb-timing.html
π₯ [ tweet ]
Timing from @hackthebox_eu had LFI, directory traversal, a side channel/timing attack, a mass assignment vulnerability, LFI+upload = RCE, and a custom downloader to exploit, all on the way to root.
https://t.co/QHYKm3OnLU
π https://0xdf.gitlab.io/2022/06/04/htb-timing.html
π₯ [ tweet ]
π [ hackinarticles, Hacking Articles ]
Process Ghosting Attack
https://t.co/DCcAxkRjDQ
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
π https://www.hackingarticles.in/process-ghosting-attack/
π₯ [ tweet ]
Process Ghosting Attack
https://t.co/DCcAxkRjDQ
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
π https://www.hackingarticles.in/process-ghosting-attack/
π₯ [ tweet ]
π [ hackinarticles, Hacking Articles ]
Powercat for Pentester
https://t.co/irffdvbILa
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
π https://www.hackingarticles.in/powercat-for-pentester/
π₯ [ tweet ]
Powercat for Pentester
https://t.co/irffdvbILa
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
π https://www.hackingarticles.in/powercat-for-pentester/
π₯ [ tweet ]
π [ m3g9tr0n, Spiros Fraganastasis ]
Administrative tools and logon types
https://t.co/jGi99iBpvO
π https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types
π₯ [ tweet ]
Administrative tools and logon types
https://t.co/jGi99iBpvO
π https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types
π₯ [ tweet ]
π₯1
π [ c3rb3ru5d3d53c, ΟΞ΅ΡΞ²Ξ΅ΡΞΌs - ΠΌΞ±βΟΞ±ΡΞ΅ ΡΞ΅sΡαΡΟΠ½Ξ΅Ρ ]
#Suricata #Signature for Confluence CVE-2022-26134 #exploit #poc
ATTACK Potential URI Template Injection
https://t.co/8mVZhciNqF
π https://github.com/c3rb3ru5d3d53c/signatures/blob/master/signatures/attack/injection/template/template.suricata-6.0.5.rules
π₯ [ tweet ]
#Suricata #Signature for Confluence CVE-2022-26134 #exploit #poc
ATTACK Potential URI Template Injection
https://t.co/8mVZhciNqF
π https://github.com/c3rb3ru5d3d53c/signatures/blob/master/signatures/attack/injection/template/template.suricata-6.0.5.rules
π₯ [ tweet ]
π [ an0n_r0, an0n ]
storing creds for a runas-like utility in a saved config file is a security mistake, even if the tool offers "seriously obfuscated encrypted" files. all we need is just hooking CreateProcessWithLogonW (hello to @fridadotre) and no worries about reversing proprietary encryptions.
π https://gist.github.com/tothi/dd3bdd5d9f88ffcd32be15b2ce480aa6
π₯ [ tweet ]
storing creds for a runas-like utility in a saved config file is a security mistake, even if the tool offers "seriously obfuscated encrypted" files. all we need is just hooking CreateProcessWithLogonW (hello to @fridadotre) and no worries about reversing proprietary encryptions.
π https://gist.github.com/tothi/dd3bdd5d9f88ffcd32be15b2ce480aa6
π₯ [ tweet ]
π [ m3g9tr0n, Spiros Fraganastasis ]
Exploring data saved by Chrome/Edge/Any Chromium
https://t.co/5zAXvnmsa9 #dpapi
π https://gist.github.com/jhoneill/e585bae781f3efa7ac1992b79e037713
π₯ [ tweet ]
Exploring data saved by Chrome/Edge/Any Chromium
https://t.co/5zAXvnmsa9 #dpapi
π https://gist.github.com/jhoneill/e585bae781f3efa7ac1992b79e037713
π₯ [ tweet ]
π2
π [ NinjaParanoid, Paranoid Ninja (Brute Ratel C4) ]
Hunting alertable threads for QAPC on existing processes, rop-gadgets, Stagers and start address spoofing for the upcoming BRc4 v1.1 release...
https://t.co/5GH2Nwnp74
π https://www.youtube.com/watch?v=w8ictUBcCrM
π₯ [ tweet ]
Hunting alertable threads for QAPC on existing processes, rop-gadgets, Stagers and start address spoofing for the upcoming BRc4 v1.1 release...
https://t.co/5GH2Nwnp74
π https://www.youtube.com/watch?v=w8ictUBcCrM
π₯ [ tweet ]
π [ DirectoryRanger, DirectoryRanger ]
O365-Doppelganger. script to harvest credentials off of a user during a Red Team and get execution of a file from the user
https://t.co/0CpScve1sn
π https://github.com/paranoidninja/O365-Doppelganger
π₯ [ tweet ]
O365-Doppelganger. script to harvest credentials off of a user during a Red Team and get execution of a file from the user
https://t.co/0CpScve1sn
π https://github.com/paranoidninja/O365-Doppelganger
π₯ [ tweet ]
π1
π [ m3g9tr0n, Spiros Fraganastasis ]
Active Directory delegations inventory in Rust
https://t.co/qOoTA6X4yi
π https://github.com/mtth-bfft/adeleg
π₯ [ tweet ]
Active Directory delegations inventory in Rust
https://t.co/qOoTA6X4yi
π https://github.com/mtth-bfft/adeleg
π₯ [ tweet ]
π [ hackinarticles, Hacking Articles ]
MITRE ATT&CK: Initial Access
Credit https://t.co/wtfCJx9CMi
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
π https://github.com/JPMinty/MindMaps/tree/master/MITRE%20ATT%26CK/PNG
π₯ [ tweet ]
MITRE ATT&CK: Initial Access
Credit https://t.co/wtfCJx9CMi
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
π https://github.com/JPMinty/MindMaps/tree/master/MITRE%20ATT%26CK/PNG
π₯ [ tweet ]
π [ Tarlogic, Tarlogic ]
Vulnerability CVE-2022-26134 has compromised Atlassian @Confluence servers and data centers and, along the way, the security of a multitude of companies. Our colleague @TuLkHaXs analyzes the scale of the incident and how to neutralize it π
https://t.co/6k6ILkif0i
π https://www.tarlogic.com/blog/cve-2022-26134-zero-day-vulnerability-affecting-atlassian-confluence/
π₯ [ tweet ]
Vulnerability CVE-2022-26134 has compromised Atlassian @Confluence servers and data centers and, along the way, the security of a multitude of companies. Our colleague @TuLkHaXs analyzes the scale of the incident and how to neutralize it π
https://t.co/6k6ILkif0i
π https://www.tarlogic.com/blog/cve-2022-26134-zero-day-vulnerability-affecting-atlassian-confluence/
π₯ [ tweet ]
π [ ReconOne_, ReconOne ]
GitHub Recon in Manual mode - Part 3 - Database
credits: techgaun/github-dorks
#recon #recontips #github #AttackSurface #bugbountytips #reconone #Database #gitrecon
π₯ [ tweet ]
GitHub Recon in Manual mode - Part 3 - Database
credits: techgaun/github-dorks
#recon #recontips #github #AttackSurface #bugbountytips #reconone #Database #gitrecon
π₯ [ tweet ]