#tools
#Red_Team_Tactics
Extending AD CS attack surface to the cloud with Intune certificates
https://dirkjanm.io/extending-ad-cs-attack-surface-intune-certs
// Hybrid certificate attack paths:
scenarios, recommendations for exploitation and elimination of vulnerabilities
Related tools:
]-> SCEP request tool for AD CS NDES and Intune
]-> Tool for AD Certificate Services enum/abuse
]-> Tools for Kerberos PKINIT and relaying to AD CS
@Zerosec_team
#Red_Team_Tactics
Extending AD CS attack surface to the cloud with Intune certificates
https://dirkjanm.io/extending-ad-cs-attack-surface-intune-certs
// Hybrid certificate attack paths:
scenarios, recommendations for exploitation and elimination of vulnerabilities
Related tools:
]-> SCEP request tool for AD CS NDES and Intune
]-> Tool for AD Certificate Services enum/abuse
]-> Tools for Kerberos PKINIT and relaying to AD CS
@Zerosec_team
dirkjanm.io
Extending AD CS attack surface to the cloud with Intune certificates
Active Directory Certificate Services (AD CS) attack surface is pretty well explored in Active Directory itself, with *checks notes* already 16 “ESC” attacks being publicly described. Hybrid certificate attack paths have not gained that much attention yet…
❤3👍1
DOMino.pdf
9.6 MB
#tools
#WebApp_Security
#Offensive_security
DEF CON 33:
"The DOMino Effect:
Automated Detection and Exploitation of DOM Clobbering Vulnerability at Scale".
]-> dynamic analysis tool to detect/exploit DOMC vulns
]-> Dataset: DOMC Gadgets Collection
]-> Research (.pdf)
// .. first dynamic analysis framework to automatically detect and exploit DOM Clobbering gadgets. Key insight is to model attacker-controlled HTML markups as Symbolic DOM - a formalized representation to define and solve DOM-related constraints with in the gadgets - so that it can be used to generate exploit HTML markups
⭐️ @Zerosec_team
#WebApp_Security
#Offensive_security
DEF CON 33:
"The DOMino Effect:
Automated Detection and Exploitation of DOM Clobbering Vulnerability at Scale".
]-> dynamic analysis tool to detect/exploit DOMC vulns
]-> Dataset: DOMC Gadgets Collection
]-> Research (.pdf)
// .. first dynamic analysis framework to automatically detect and exploit DOM Clobbering gadgets. Key insight is to model attacker-controlled HTML markups as Symbolic DOM - a formalized representation to define and solve DOM-related constraints with in the gadgets - so that it can be used to generate exploit HTML markups
⭐️ @Zerosec_team
👍6
#tools
#OSINT
#Offensive_security
POC : OSINT with LLM
https://github.com/mouna23/OSINT-with-LLM
// This repository demonstrates domain, IP, and email reconnaissance with LLM-powered security reporting
See also:
]-> RAG OSINT Tool
]-> LLM OSINT PoC Tool
]-> OSINT LLM Collector and Analyser
]-> AI-powered subdomain enumeration
tool with local LLM analysis via Ollama
@Radvansec
#OSINT
#Offensive_security
POC : OSINT with LLM
https://github.com/mouna23/OSINT-with-LLM
// This repository demonstrates domain, IP, and email reconnaissance with LLM-powered security reporting
See also:
]-> RAG OSINT Tool
]-> LLM OSINT PoC Tool
]-> OSINT LLM Collector and Analyser
]-> AI-powered subdomain enumeration
tool with local LLM analysis via Ollama
@Radvansec
❤5👍2