🚀 Apepe - Mobile application pentesting🚀
🕵️ Apepe is a Python tool developed to help pentesters and red teamers to easily get information from the target app. This tool will extract basic informations as the package name, if the app is signed and the development language...
🧾 Source - github.com/oppsec/Apepe
🕵️ Apepe is a Python tool developed to help pentesters and red teamers to easily get information from the target app. This tool will extract basic informations as the package name, if the app is signed and the development language...
🧾 Source - github.com/oppsec/Apepe
👍1
Forwarded from BM SECURITY Group 🇺🇿
CrowdStrike-ning Falcon Sensor dasturining yangilanishi tufayli yuzaga kelgan apokalipsis tarqalishda davom etmoqda. Dasturiy ta'minot Windows operatsion tizimida ishlaydigan 8,5 million kompyuterni o'chirib qo'yganidan xabaringiz bor. Endi Linux OS bazasidagi kompyuterlar va serverlarining ham ishdan chiqishiga sabab bo'lmoqda.
Red Hat o'z mijozlarini falcon dasturining "5.14.0-427.13.1.el9_4.x86_64" sonini yuklagandan so'ng "Kernel Panic" muammosi kelib chiqqani haqida ogohlantirdi.
CrowdStrike Falcon Sensor/Agent bilan bog'liq ikkinchi muammo "cshook_network_ops_inet6_sockraw_release+0x171a9" tizimni ishdan chiqarishi mumkinligi takidlangan. Red Hat xavfsizlik jamoasi "Falcon Sensor/Agent" dasturiy ta'minotini vaqtinchalik ishlatmaslik, yuqoridagi muammolarga uchramaslikni ta'minlashini aytgan.
The Register jurnali esa huddi shu muammo Debian va Rocky Linuxlarda ham uchraganini aytishgan.
Fursatdan foydalangan kiberjinoyatchilar, CrowdStrike kompaniyasi nomidan "muammoni bartaraf qilish uchun tarqatilgan yangilanish" niqobida hackerlik guruhlari bir qator domenlarni ochib, ommaviy zararli yangilanishni faol tarqatishmoqda.
crowdstrikebluescreen.com crowdstrikeØday.com crowdstrike-bsod.com crowdstrikedoomsday.com crowdstrikedoomsday.com crowdstrikefix.com crowdstrikedown.site crowdstriketoken.com
Bu muammo soha mutaxassislari orasida shu qadar ko'p va keng muhokama qilinmoqdaki, xar qanday mavzudagi xazillarni CrowdStrike bilan bog'lashmoqda, AI orqali she'rlar yozilmoqda, memlar soni esa cheksiz)). Birjadagi narxlarning qulashi fonida kompaniya rahbari bir qator xodimlarni ishdan bo'shatganini ham X da yozishmoqda. "blue screen of death" shu paytgacha "BSOD" bo'lgan bo'lsa, endi "BSODStrike" termini ham paydo bo'ldi 😁
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
BBRF-Client: The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices.
https://github.com/honoki/bbrf-client/
#Recon
https://github.com/honoki/bbrf-client/
#Recon
👍1
Red Team Interview Questions
Репозиторий, охватывающий широкий спектр тем и вопросов для кандидатов на собеседование, которые готовятся работать пентестерами в составе красной команды.
1. Initial Access
2. Windows Network
3. Active Directory
4. OS Language Programming
5. PowerShell
6. Windows Internals
7. DNS Server
8. Windows API
9. Macro Attack
10. APT Groups
11. EDR and Antivirus
12. Malware Development
13. System & Kernel Programming
14. Privilege Escalation
15. Post-exploitation (and Lateral Movement)
16. Persistence
17. Breaking Hash
18. C&C (Command and Control)
19. DLL
20. DNS Rebinding
21. LDAP
22. Evasion
23. Steganography
24. Kerberoasting and Kerberos
25. Mimikatz
26. RDP
27. NTLM
28. YARA Language
29. Windows API And DLL Difference
30. Antivirus and EDR Difference
31. NTDLL
32. Native API
33. Windows Driver
34. Tunneling
35. Shadow File
36. SAM File
37. LSA
38. LSASS
39. WDIGEST
40. CredSSP
41. MSV
42. LiveSSP
43. TSpkg
44. CredMan
45. EDR NDR XDR
46. Polymorphic Malware
47. Pass-the-Hash, Pass-the-Ticket or Build Golden Tickets
48. Firewall
49. WinDBG (Windows Debugger)
50. PE (Portable Executable)
51. ICMP
52. Major Microsoft frameworks for Windows
53. Services and Processes
54. svchost
55. CIM Class
56. CDB, NTSD, KD, Gflags, GflagsX, PE Explorer
57. Sysinternals Suite (tools)
58. Undocumented Functions
59. Process Explorer vs Process Hacker
60. CLR (Common Language Runtime)
Репозиторий, охватывающий широкий спектр тем и вопросов для кандидатов на собеседование, которые готовятся работать пентестерами в составе красной команды.
1. Initial Access
2. Windows Network
3. Active Directory
4. OS Language Programming
5. PowerShell
6. Windows Internals
7. DNS Server
8. Windows API
9. Macro Attack
10. APT Groups
11. EDR and Antivirus
12. Malware Development
13. System & Kernel Programming
14. Privilege Escalation
15. Post-exploitation (and Lateral Movement)
16. Persistence
17. Breaking Hash
18. C&C (Command and Control)
19. DLL
20. DNS Rebinding
21. LDAP
22. Evasion
23. Steganography
24. Kerberoasting and Kerberos
25. Mimikatz
26. RDP
27. NTLM
28. YARA Language
29. Windows API And DLL Difference
30. Antivirus and EDR Difference
31. NTDLL
32. Native API
33. Windows Driver
34. Tunneling
35. Shadow File
36. SAM File
37. LSA
38. LSASS
39. WDIGEST
40. CredSSP
41. MSV
42. LiveSSP
43. TSpkg
44. CredMan
45. EDR NDR XDR
46. Polymorphic Malware
47. Pass-the-Hash, Pass-the-Ticket or Build Golden Tickets
48. Firewall
49. WinDBG (Windows Debugger)
50. PE (Portable Executable)
51. ICMP
52. Major Microsoft frameworks for Windows
53. Services and Processes
54. svchost
55. CIM Class
56. CDB, NTSD, KD, Gflags, GflagsX, PE Explorer
57. Sysinternals Suite (tools)
58. Undocumented Functions
59. Process Explorer vs Process Hacker
60. CLR (Common Language Runtime)
GitHub
GitHub - HadessCS/Red-team-Interview-Questions: Red team Interview Questions
Red team Interview Questions. Contribute to HadessCS/Red-team-Interview-Questions development by creating an account on GitHub.
👍1
Hammaga salom do'stlar anchadan buyon ishlar ko'payib post yozmay qoygandim. Bu kanalda asosan kiber xavfsizlikni o'rganishga doir materiallar tashlab boriladi. Asosan o'zim ish davomida zaifliklarni topsishda yani pentesting va bugbounty qanday materiallardan foydalanayotganim haqida postlar tashlayman.
Shu o'rinda bugun bir necha zaifliklarga duch keldim va shuni sizlar bilan baham ko'rmoqchiman!
XSS via File upload vulnerability:
Odatda juda funksinalliklarga yani userlar bilan ishlashga mo'ljallangan platformalarda malum bir shaxsni tasdiqlovchi hujjatlar talab qilinishini va qanday turdagi fayllarni yuklash kerakligiga etibor bering! Shunda qanday qilib ushbu fayl turlarini bypass qilib shell yuklashga hamda uni RCE ga aylantirishga harakat qiling.
Bugun xuddi shu narsaga etibor bermaganligim uchun faqatgina PDF ichiga JS payload inject qilib stored XSS zaifligini topdim. Aslida undan ham katta natijaga erishishim mumkin edi, ammo etiborsizligim tufayli oddiy bir narsani unitib qo'ydim. Shunda kasbdoshim kelib qoldi XSS uchun payload emas balki php shell yuklashim kerakligini aytdi. Shunda requstni BurpSuite orqali ushlab pdf fayl ichiga php payload yozdik va uni serverga yukladik. Shunda php payloadimiz ishladi va RCE olishga muavaffaq bo'ldik😎
Ushbu malumotlar o'zimning xatolarimni esdan chiqarmaslik va sizlarnig rivojlanishigizga ozgina bo'lsa ham hissa qo'shish maqsadida yozildi.
Shu o'rinda bugun bir necha zaifliklarga duch keldim va shuni sizlar bilan baham ko'rmoqchiman!
XSS via File upload vulnerability:
Odatda juda funksinalliklarga yani userlar bilan ishlashga mo'ljallangan platformalarda malum bir shaxsni tasdiqlovchi hujjatlar talab qilinishini va qanday turdagi fayllarni yuklash kerakligiga etibor bering! Shunda qanday qilib ushbu fayl turlarini bypass qilib shell yuklashga hamda uni RCE ga aylantirishga harakat qiling.
Bugun xuddi shu narsaga etibor bermaganligim uchun faqatgina PDF ichiga JS payload inject qilib stored XSS zaifligini topdim. Aslida undan ham katta natijaga erishishim mumkin edi, ammo etiborsizligim tufayli oddiy bir narsani unitib qo'ydim. Shunda kasbdoshim kelib qoldi XSS uchun payload emas balki php shell yuklashim kerakligini aytdi. Shunda requstni BurpSuite orqali ushlab pdf fayl ichiga php payload yozdik va uni serverga yukladik. Shunda php payloadimiz ishladi va RCE olishga muavaffaq bo'ldik😎
Ushbu malumotlar o'zimning xatolarimni esdan chiqarmaslik va sizlarnig rivojlanishigizga ozgina bo'lsa ham hissa qo'shish maqsadida yozildi.
🔥3🤣2❤1😐1
🇨🇦Canadian OSINT🇨🇦
- business and corporate info
- archives and genealogy
- legal and court info
- people search
and more (dozens of resources).
https://github.com/S3V3N11S/Canadian-OSINT-
Contributor Jason Colborne
- business and corporate info
- archives and genealogy
- legal and court info
- people search
and more (dozens of resources).
https://github.com/S3V3N11S/Canadian-OSINT-
Contributor Jason Colborne
👍1
add this file to your wordlist .gitlab-ci.yml , enjoy
its contain a database username and password
#bugbounty #bugbountytips
its contain a database username and password
#bugbounty #bugbountytips
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
Ciphey
#decode #crack #crypto #Pentest
Автоматически расшифровывайте шифры без знания ключа или шифра, декодируйте кодировки и взламывайте хеши. Если вы мало что знаете о криптографии или хотите быстро проверить зашифрованный текст, прежде чем работать с ним самостоятельно, Ciphey идеально подойдет вам.
Ciphey использует специально созданный модуль искусственного интеллекта (AuSearch) с интерфейсом обнаружения шифров, чтобы приблизительно определить, чем что-то зашифровано. А затем, настраиваемый интерфейс проверки языка, помогает собрать из приблизительного текста — истинный.
Ссылка на инструмент.
Ссылка на документацию.
LH | Новости | Курсы | Мемы
#рекомендация
#рекомендации
#decode #crack #crypto #Pentest
Автоматически расшифровывайте шифры без знания ключа или шифра, декодируйте кодировки и взламывайте хеши. Если вы мало что знаете о криптографии или хотите быстро проверить зашифрованный текст, прежде чем работать с ним самостоятельно, Ciphey идеально подойдет вам.
Ciphey использует специально созданный модуль искусственного интеллекта (AuSearch) с интерфейсом обнаружения шифров, чтобы приблизительно определить, чем что-то зашифровано. А затем, настраиваемый интерфейс проверки языка, помогает собрать из приблизительного текста — истинный.
Ссылка на инструмент.
Ссылка на документацию.
LH | Новости | Курсы | Мемы
#рекомендация
#рекомендации
👍1
🚨 Depix 👉 It is a free and open-source tool used for image steganography, specifically for extracting hidden data from images.
🔗Download : https://github.com/spipm/Depix
#bugbounty #bugbountytips
🔗Download : https://github.com/spipm/Depix
#bugbounty #bugbountytips
🔥2👍1
Forwarded from Похек (Сергей Зыбнев)
api-fuzzing-lists.zip
8.7 MB
API FUZZING LISTS
Вне очереди пост, очень вкусный сборник фаззинг вордлистов для API
Описание данного списка от автора:
744,000+ endpoints
357,000+ object properties
211,000+ object names
127,000+ query parameters
74,000+ parameter values
35,000+ path parameters
8,300+ headers
5,300+ paths
880+ common ports
Взял ТУТ
🌚 @poxek | 📹 YouTube
Вне очереди пост, очень вкусный сборник фаззинг вордлистов для API
Описание данного списка от автора:
744,000+ endpoints
357,000+ object properties
211,000+ object names
127,000+ query parameters
74,000+ parameter values
35,000+ path parameters
8,300+ headers
5,300+ paths
880+ common ports
Взял ТУТ
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Forwarded from SecuriXy.kz
#CVE-2024-22274: Privilege Escalation: #VMware #vCenter Server Authenticated #RCE
https://github.com/l0n3m4n/CVE-2024-22274-RCE
https://github.com/l0n3m4n/CVE-2024-22274-RCE
👍1
The following are additional tools that allow you to search for breach data dumps:
WhatBreach: https://github.com/Ekultek/WhatBreach
LeakLooker: https://github.com/woj-ciech/LeakLooker
Buster: https://github.com/sham00n/buster
Scavenger: https://github.com/rndinfosecguy/Scavenger
PwnDB: https://github.com/davidtavarez/pwndb
WhatBreach: https://github.com/Ekultek/WhatBreach
LeakLooker: https://github.com/woj-ciech/LeakLooker
Buster: https://github.com/sham00n/buster
Scavenger: https://github.com/rndinfosecguy/Scavenger
PwnDB: https://github.com/davidtavarez/pwndb
GitHub
GitHub - Ekultek/WhatBreach: OSINT tool to find breached emails, databases, pastes, and relevant information
OSINT tool to find breached emails, databases, pastes, and relevant information - Ekultek/WhatBreach
👍1