SoheilSec
Pentest Steps.xmind
نسخه فارسی Penetration Testing Mind
Credit : Hamid Kashfi
Credit : Hamid Kashfi
My old Template 2016 (information Gathering).xmind
4.4 MB
Information Gathering Xmind
Credit : Soheil Hashemi
Good for Penetration Testing Report
Credit : Soheil Hashemi
Good for Penetration Testing Report
project-Vul Assessment mind-94.0.0.xmind
4.1 MB
Vulnerability Assessments Part
Credit : soheil Hashemi
Credit : soheil Hashemi
Data for 700M #LinkedIn Users Posted for Sale in #Raidforums
https://threatpost.com/data-700m-linkedin-users-cyber-underground/167362/?utm_source=dlvr.it&utm_medium=linkedin
https://raidforums.com/Thread-SELLING-New-Linkedin-2021-700Million-records?highlight=linkedin
https://threatpost.com/data-700m-linkedin-users-cyber-underground/167362/?utm_source=dlvr.it&utm_medium=linkedin
https://raidforums.com/Thread-SELLING-New-Linkedin-2021-700Million-records?highlight=linkedin
Threat Post
Data for 700M LinkedIn Users Posted for Sale in Cyber-Underground
After 500 million LinkedIn enthusiasts were affected in a data-scraping incident in April, it's happened again - with big security ramifications.
Disclosure of a bug in Adobe’s content-management solution – used by Mastercard, LinkedIn and PlayStation – were released.
https://threatpost.com/rce-bug-in-adobe-revealed/167382/
#adobe
#0day
https://threatpost.com/rce-bug-in-adobe-revealed/167382/
#adobe
#0day
Threat Post
Details of RCE Bug in Adobe Experience Manager Revealed
Disclosure of a bug in Adobe’s content-management solution - used by Mastercard, LinkedIn and PlayStation – were released.
CVE-2021-35523: Local Privilege Escalation in Securepoint SSL VPN Client 2.0.30
https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/
https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent
https://github.com/irsl/gcp-dhcp-takeover-code-exec
#googlecloud
#takeover
https://github.com/irsl/gcp-dhcp-takeover-code-exec
#googlecloud
#takeover
GitHub
GitHub - irsl/gcp-dhcp-takeover-code-exec: Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting…
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent - irsl/gcp-dhcp-takeover-code-exec
CVE-2020-1170 - Microsoft Windows Defender Elevation of Privilege Vulnerability
CVE-2020-1170, an elevation of privilege bug in Windows Defender
https://itm4n.github.io/cve-2020-1170-windows-defender-eop/
CVE-2020-1170, an elevation of privilege bug in Windows Defender
https://itm4n.github.io/cve-2020-1170-windows-defender-eop/
itm4n’s blog
CVE-2020-1170 - Microsoft Windows Defender Elevation of Privilege Vulnerability
Here is my writeup about CVE-2020-1170, an elevation of privilege bug in Windows Defender. Finding a vulnerability in a security-oriented product is quite satisfying. Though, there was nothing groundbreaking. It’s quite the opposite actually and I’m surprised…
Top 10 Vulnerabilities: Internal Infrastructure Pentest
https://www.infosecmatter.com/top-10-vulnerabilities-internal-infrastructure-pentest/
https://www.infosecmatter.com/top-10-vulnerabilities-internal-infrastructure-pentest/
InfosecMatter
Top 10 Vulnerabilities: Internal Infrastructure Pentest - InfosecMatter
Top #10 vulnerabilities found during internal infrastructure penetration tests. Weak and default passwords, outdated software, insufficient network segregation..
IBM Gifts Threat Hunting Tool to Open Cybersecurity Alliance
Kestrel Threat Hunting Language
https://github.com/opencybersecurityalliance/kestrel-lang
#threathunting #opensource
Kestrel Threat Hunting Language
https://github.com/opencybersecurityalliance/kestrel-lang
#threathunting #opensource
GitHub
GitHub - opencybersecurityalliance/kestrel-lang: Kestrel threat hunting language: building reusable, composable, and shareable…
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel. - opencybersecurityalliance/kestrel-lang
Pwning Cisco ISE: From Cross Site Scripting to Root Shell!
https://www.reddit.com/r/ReverseEngineering/comments/oasy1n/pwning_cisco_ise_from_cross_site_scripting_to/
https://www.reddit.com/r/ReverseEngineering/comments/oasy1n/pwning_cisco_ise_from_cross_site_scripting_to/
reddit
Pwning Cisco ISE: From Cross Site Scripting to Root Shell!
Posted in r/ReverseEngineering by u/ChoiceGrapefruit0 • 53 points and 5 comments
Operation Eagle Eye - RCE to Enterprise Man-In-The-Middle
https://www.securifera.com/blog/2021/06/24/operation-eagle-eye/
https://www.securifera.com/blog/2021/06/24/operation-eagle-eye/
Securifera
Operation Eagle Eye
This article is in no way affiliated, sponsored, or endorsed with/by Fidelis Cybersecurity. All graphics are being displayed under fair use for the purposes of this article.
Operation Eagle Eye
Who remembers that movie about 15 years ago called Eagle…
Operation Eagle Eye
Who remembers that movie about 15 years ago called Eagle…
IoT tools
#radereye
A tool made for specially scanning nearby devices[BLE, Bluetooth & Wifi] and execute our given command on our system when the target device comes in-between range.
https://github.com/souravbaghz/RadareEye
#canghost
Automated Script For Hacking Into CAN Bus - Car Hacking
https://github.com/souravbaghz/CANghost
#radereye
A tool made for specially scanning nearby devices[BLE, Bluetooth & Wifi] and execute our given command on our system when the target device comes in-between range.
https://github.com/souravbaghz/RadareEye
#canghost
Automated Script For Hacking Into CAN Bus - Car Hacking
https://github.com/souravbaghz/CANghost
GitHub
GitHub - souravbaghz/RadareEye: Tool for especially scanning nearby devices and execute a given command on its own system while…
Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range. - souravbaghz/RadareEye
روند افزایش امنیت توییتر
سال 2018 2FA فعال کرد.
2019 برای جلوگیری از SIM-Swapping اجازه داد بدون شماره تلفن 2FA فعال کنند.
2020 اجازه استفاده اضافه کردن چند 2FA به کاربران داد.
و اکنون کلیدهای امنیتی رو به مکانیزم های امنیتی 2FA خودش اضافه کرده جالبی قضیه اینکه این مکانیزم بر پایه استانداردهای FIDO و WebAuthn هست که در صورت سواستفاده سایت های فیشینگ تشخیص میدند !
https://help.twitter.com/en/managing-your-account/two-factor-authentication
پ.ن امنیت بانک ها و بقیه زیرساخت های ما تو چه سطح هستند ؟
سال 2018 2FA فعال کرد.
2019 برای جلوگیری از SIM-Swapping اجازه داد بدون شماره تلفن 2FA فعال کنند.
2020 اجازه استفاده اضافه کردن چند 2FA به کاربران داد.
و اکنون کلیدهای امنیتی رو به مکانیزم های امنیتی 2FA خودش اضافه کرده جالبی قضیه اینکه این مکانیزم بر پایه استانداردهای FIDO و WebAuthn هست که در صورت سواستفاده سایت های فیشینگ تشخیص میدند !
https://help.twitter.com/en/managing-your-account/two-factor-authentication
پ.ن امنیت بانک ها و بقیه زیرساخت های ما تو چه سطح هستند ؟
X
How to use two-factor authentication (2FA) on X
Two-factor authentication is an extra layer of security for your X account. Get an overview of this feature, including how to enable it.
image_2021-07-01_17-17-39.png
17.8 KB
settings and privacy - > security and account Access - > Two Factor Authentication | additional password protection
SoheilSec
https://twitter.com/gentilkiwi/status/1410066827590447108?s=28
C# LPE implementation released CVE-2021-1675 0day SharpPrintNightmare
Local Privilege Escalation Edition of CVE-2021-1675
https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare
https://github.com/hlldz/CVE-2021-1675-LPE
printnightmare add to #mimikatz
https://github.com/gentilkiwi/mimikatz/releases/tag/2.2.0-20210701
تا زمانی که پچ نشده این باگ رویایی باید سرویس spool print دیسیبل کنید عجیب یاد ms17-010# میافتم.
https://nakedsecurity.sophos.com/2021/06/30/printnightmare-the-zero-day-hole-in-windows-heres-what-to-do/
scanner :
rpcdump.py @192.168.1.10 | grep MS-RPRN
Protocol: [MS-RPRN]: Print System Remote Protocol
https://github.com/cube0x0/CVE-2021-1675
#mitigation
The patch released by Microsoft does not unfortunately fix the issue, therefore a workaround fix can be applied by disabling the printer spooler service. Here's how to do it on both GPO and PowerShell.
https://github.com/LaresLLC/CVE-2021-1675
#0day
#printnightmare
#Scanner
#mimikatz
#postexploit
#cve-2021-1675
#LPE
Local Privilege Escalation Edition of CVE-2021-1675
https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare
https://github.com/hlldz/CVE-2021-1675-LPE
printnightmare add to #mimikatz
https://github.com/gentilkiwi/mimikatz/releases/tag/2.2.0-20210701
تا زمانی که پچ نشده این باگ رویایی باید سرویس spool print دیسیبل کنید عجیب یاد ms17-010# میافتم.
https://nakedsecurity.sophos.com/2021/06/30/printnightmare-the-zero-day-hole-in-windows-heres-what-to-do/
scanner :
rpcdump.py @192.168.1.10 | grep MS-RPRN
Protocol: [MS-RPRN]: Print System Remote Protocol
https://github.com/cube0x0/CVE-2021-1675
#mitigation
The patch released by Microsoft does not unfortunately fix the issue, therefore a workaround fix can be applied by disabling the printer spooler service. Here's how to do it on both GPO and PowerShell.
https://github.com/LaresLLC/CVE-2021-1675
#0day
#printnightmare
#Scanner
#mimikatz
#postexploit
#cve-2021-1675
#LPE
GitHub
CVE-2021-1675/SharpPrintNightmare at main · cube0x0/CVE-2021-1675
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 - cube0x0/CVE-2021-1675
👍1
Kubernetes.jpg
733.9 KB
NSA, Partners Release Cybersecurity Advisory on Brute Force Global Cyber Campaign
شاید فکر کنید بروت فورس یک حمله ساده و بدون هدف هست!
https://www.nsa.gov/news-features/press-room/Article/2677750/nsa-partners-release-cybersecurity-advisory-on-brute-force-global-cyber-campaign/
#TTP
#mitigation
#NSA
#FBI
#CISA
شاید فکر کنید بروت فورس یک حمله ساده و بدون هدف هست!
https://www.nsa.gov/news-features/press-room/Article/2677750/nsa-partners-release-cybersecurity-advisory-on-brute-force-global-cyber-campaign/
#TTP
#mitigation
#NSA
#FBI
#CISA
Revil Ransomware New Model RAAS
Ransomware As A Service
TTP & mitigation with MITRE ATT&CK
#ransomware
#Revil
#RAAS
#TTP
#mitigation
#MITRE
Ransomware As A Service
TTP & mitigation with MITRE ATT&CK
#ransomware
#Revil
#RAAS
#TTP
#mitigation
#MITRE