Black Friday at Tryhackme. Get a 1-year premium subscription from Tryhackme at a 40% discount and you'll definitely get great results. An investment in education is an investment in the future!
#Tryhackme #BlackFriday
#Tryhackme #BlackFriday
Forwarded from Suhayl.log
Blue teamni o'rganmoqchi bo'lganlar uchun TryHackMe SOC1 dan boshlanglar
albatta keyin SOC2
undan tashqari BTL1 sertifikatiga topshirishni mahlahat beraman (SOC1 da o'rgangan bilimlar va tajriba bilan topshirsa bo'ladi)
Keyingi qadam BTL2 faqat bu 2500$ maslahatim keyin hackthebox da Blueteam pathni qilib chiqish kerak
albatta keyin SOC2
undan tashqari BTL1 sertifikatiga topshirishni mahlahat beraman (SOC1 da o'rgangan bilimlar va tajriba bilan topshirsa bo'ladi)
Keyingi qadam BTL2 faqat bu 2500$ maslahatim keyin hackthebox da Blueteam pathni qilib chiqish kerak
https://tryhackme.com/path/outline/webappredteaming
New learnig path Web App Red Teaming by Tryhackme
#Web #Pentest #Tryhackme
New learnig path Web App Red Teaming by Tryhackme
#Web #Pentest #Tryhackme
❤1
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42278
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2021-42278
https://github.com/Ridter/noPac
https://www.secureworks.com/blog/nopac-a-tale-of-two-vulnerabilities-that-could-end-in-ransomware
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2021-42278
https://github.com/Ridter/noPac
https://www.secureworks.com/blog/nopac-a-tale-of-two-vulnerabilities-that-could-end-in-ransomware
GitHub
GitHub - Ridter/noPac: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user - GitHub - Ridter/noPac: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai...
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2021-42287
https://github.com/cube0x0/noPac
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42287
CVE-2021-42287
https://github.com/cube0x0/noPac
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42287
GitHub
GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. - cube0x0/noPac
Forwarded from Social Engineering
• Автор этого материала собрал очень объемный гайд по пентесту CMS Bitrix, который включает в себя большое кол-во техник и различных методов. Вот содержание:
- Основы битриксологии:
- Определение версии;
- Множественные эндпоинты для авторизации:
- Интересные эндпоинты;
- Content Spoofing;
- Account Enumeration;
- Non-legitimate registration;
- Open Redirect;
- XSS уязвимости;
- SSRF;
- LFI;
- RCE:
- BDU:2024-01501:
- WAF Bypass;
- LPE;
- Bitrix24:
- Уязвимые модули:
- Поиск интересных директорий и файлов.
- Сканер под bitrix - “huitrix”:
- References:
S.E. ▪️ infosec.work ▪️ VT
Please open Telegram to view this post
VIEW IN TELEGRAM