Forwarded from Offensive Twitter Eye
π [ hackinarticles, Hacking Articles ]
A Detailed Guide on Rubeus
https://t.co/XmD8LfJGY5
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
π https://www.hackingarticles.in/a-detailed-guide-on-rubeus/
π₯ [ tweet ]
A Detailed Guide on Rubeus
https://t.co/XmD8LfJGY5
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
π https://www.hackingarticles.in/a-detailed-guide-on-rubeus/
π₯ [ tweet ]
Forwarded from Offensive Twitter Eye
π [ hackinarticles, Hacking Articles ]
Domain Persistence: Silver Ticket Attack
https://t.co/GDmxv0kJID
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
π https://www.hackingarticles.in/domain-persistence-silver-ticket-attack/
π₯ [ tweet ]
Domain Persistence: Silver Ticket Attack
https://t.co/GDmxv0kJID
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
π https://www.hackingarticles.in/domain-persistence-silver-ticket-attack/
π₯ [ tweet ]
Forwarded from Offensive Twitter Eye
π [ hackinarticles, Hacking Articles ]
Domain Escalation: Unconstrained Delegation
https://t.co/qWxRjcg7UF
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
π https://www.hackingarticles.in/domain-escalation-unconstrained-delegation/
π₯ [ tweet ]
Domain Escalation: Unconstrained Delegation
https://t.co/qWxRjcg7UF
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
π https://www.hackingarticles.in/domain-escalation-unconstrained-delegation/
π₯ [ tweet ]
Forwarded from Offensive Twitter Eye
π [ hackinarticles, Hacking Articles ]
Domain Persistence: Golden Certificate Attack
https://t.co/SmMarfX7hK
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
π https://www.hackingarticles.in/domain-persistence-golden-certificate-attack/
π₯ [ tweet ]
Domain Persistence: Golden Certificate Attack
https://t.co/SmMarfX7hK
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
π https://www.hackingarticles.in/domain-persistence-golden-certificate-attack/
π₯ [ tweet ]
π [ CoreAdvisories, CoreLabs Research ]
Get an in-depth analysis of recent #Windows #vulnerability, CVE-2022-22029> from cybersecurity expert and #exploit writer @ricnar456
https://t.co/i4nyYDiapH
π https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-22029-windows-network-file-system-vulnerability
π₯ [ tweet ]
Get an in-depth analysis of recent #Windows #vulnerability, CVE-2022-22029> from cybersecurity expert and #exploit writer @ricnar456
https://t.co/i4nyYDiapH
π https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-22029-windows-network-file-system-vulnerability
π₯ [ tweet ]
π [ podalirius_, Podalirius ]
[#thread π§΅] This weekend I wrote a #tool to scan for @TheApacheTomcat server #vulnerabilities in networks. I've always dreamed to be able to retrieve the list of computers in a #Windows #domain and scan for vulnerable #Apache #Tomcats automatically! π
https://t.co/EOWfTbFCRh
π https://github.com/p0dalirius/ApacheTomcatScanner/
π₯ [ tweet ]
[#thread π§΅] This weekend I wrote a #tool to scan for @TheApacheTomcat server #vulnerabilities in networks. I've always dreamed to be able to retrieve the list of computers in a #Windows #domain and scan for vulnerable #Apache #Tomcats automatically! π
https://t.co/EOWfTbFCRh
π https://github.com/p0dalirius/ApacheTomcatScanner/
π₯ [ tweet ]
π [ podalirius_, Podalirius ]
Today with my friend @_Worty we're releasing a technique to coerce an NTLM authentication on #Windows #SQL #Server as the machine account (in most cases). π₯³
A step by step demonstration is here: https://t.co/woCDA1M0Zr
π https://github.com/p0dalirius/MSSQL-Analysis-Coerce
π₯ [ tweet ]
Today with my friend @_Worty we're releasing a technique to coerce an NTLM authentication on #Windows #SQL #Server as the machine account (in most cases). π₯³
A step by step demonstration is here: https://t.co/woCDA1M0Zr
π https://github.com/p0dalirius/MSSQL-Analysis-Coerce
π₯ [ tweet ]
Forwarded from APT
βοΈ Privileger
Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:
β Add privileges to an account;
β Start a process by adding a specific privilege to its token;
β Remove privilege from the user.
Thanks to:
@Michaelzhm
https://github.com/MzHmO/Privileger
#ad #windows #privilege #lsa
Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:
β Add privileges to an account;
β Start a process by adding a specific privilege to its token;
β Remove privilege from the user.
Thanks to:
@Michaelzhm
https://github.com/MzHmO/Privileger
#ad #windows #privilege #lsa
π₯2
π [ OtterHacker, OtterHacker ]
I published my Kerberos experiments. The code is here for educational use only. Do not use it for pentest as it is neither OPSEC nor stable and kinda messy.
But if you want to see how to play with #Kerberos with #Windows, it can be a starting point ! π
https://t.co/CPP2EfSKCb
π https://github.com/OtterHacker/Cerbere
π₯ [ tweet ]
I published my Kerberos experiments. The code is here for educational use only. Do not use it for pentest as it is neither OPSEC nor stable and kinda messy.
But if you want to see how to play with #Kerberos with #Windows, it can be a starting point ! π
https://t.co/CPP2EfSKCb
π https://github.com/OtterHacker/Cerbere
π₯ [ tweet ]
π₯2
π [ r1cksec, r1cksec ]
New cheatsheets pushed π΅οΈββοΈ
π https://github.com/r1cksec/cheatsheets
Including:
A well written blog post on how to read and parse LSASS memory dumps with PowerShell π
#infosec #cybersecurity #pentesting #redteam #lsass #windows
π https://powerseb.github.io/posts/LSASS-parsing-without-a-cat
π₯ [ tweet ]
New cheatsheets pushed π΅οΈββοΈ
π https://github.com/r1cksec/cheatsheets
Including:
A well written blog post on how to read and parse LSASS memory dumps with PowerShell π
#infosec #cybersecurity #pentesting #redteam #lsass #windows
π https://powerseb.github.io/posts/LSASS-parsing-without-a-cat
π₯ [ tweet ]
π4
π [ HADESS @Hadess_security ]
The Art Of Hiding In Windows: techniques used by malicious actors to obscure their activities, making detection and analysis significantly more challenging for security professionals.
Article:
π https://hadess.io/the-art-of-hiding-in-windows/
EBook:
π https://hadess.io/the-art-of-hiding-in-windows-ebook/
#windows #redteam
π₯ [ tweet ]
The Art Of Hiding In Windows: techniques used by malicious actors to obscure their activities, making detection and analysis significantly more challenging for security professionals.
Article:
π https://hadess.io/the-art-of-hiding-in-windows/
EBook:
π https://hadess.io/the-art-of-hiding-in-windows-ebook/
#windows #redteam
π₯ [ tweet ]
(pdf-ΠΊΠ° Π² ΠΊΠΎΠΌΠΌΠ΅Π½ΡΠ°Ρ
)
π2π₯2
π [ NCV @nickvourd ]
Proudly Announcing Windows Local Privilege Escalation Cookbook
#pentest #redteam #windows #privesc
π https://github.com/nickvourd/Windows-Local-Privilege-Escalation-Cookbook
π₯ [ tweet ]
Proudly Announcing Windows Local Privilege Escalation Cookbook
#pentest #redteam #windows #privesc
π https://github.com/nickvourd/Windows-Local-Privilege-Escalation-Cookbook
π₯ [ tweet ]
π₯4