SoheilSec
Invoke-DNSteal is a Simple & Customizable DNS Data Exfiltrator. https://github.com/JoelGMSec/Invoke-DNSteal Exfiltrator یا Covert channel روش هایی جهت انتقال اطلاعات به بیرون از شبکه می باشند و برای دور زدن فایروال DLP استفاده می شوند. اطلاعات بیشتر: http…
Post Exploit :
mimikatz new version Workgroup and Domain now .... !
https://github.com/gentilkiwi/mimikatz/releases/tag/2.2.0-20210704
Rubeus is a C# toolset for raw Kerberos interaction and abuses.
Source :
https://github.com/GhostPack/Rubeus
Binary :
https://github.com/r3motecontrol/Ghostpack-CompiledBinaries
PS1 :
https://github.com/LuemmelSec/Pentest-Tools-Collection/tree/main/tools
Post Exploit Collection :
https://github.com/LuemmelSec/Pentest-Tools-Collection
Awesome Post Exploit include #printnightmare :
https://github.com/S3cur3Th1sSh1t/WinPwn
For Convert exe to PS1
https://github.com/cfalta/PowerShellArmoury
#postexploit #kerberos #mimikatz
mimikatz new version Workgroup and Domain now .... !
https://github.com/gentilkiwi/mimikatz/releases/tag/2.2.0-20210704
Rubeus is a C# toolset for raw Kerberos interaction and abuses.
Source :
https://github.com/GhostPack/Rubeus
Binary :
https://github.com/r3motecontrol/Ghostpack-CompiledBinaries
PS1 :
https://github.com/LuemmelSec/Pentest-Tools-Collection/tree/main/tools
Post Exploit Collection :
https://github.com/LuemmelSec/Pentest-Tools-Collection
Awesome Post Exploit include #printnightmare :
https://github.com/S3cur3Th1sSh1t/WinPwn
For Convert exe to PS1
https://github.com/cfalta/PowerShellArmoury
#postexploit #kerberos #mimikatz
👍1
SoheilSec
This is a list of victim organizations that #REvil ransomware gang has posted on its leaked blog on the #DarkWeb. A total of 273 victims they claim are posted on their darkweb leak blog site. REvil ransomware gang's Tor Network Infrastructure on Darkweb. They…
Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
#DFIR #Revil
https://github.com/cado-security/DFIR_Resources_REvil_Kaseya/
#DFIR #Revil
https://github.com/cado-security/DFIR_Resources_REvil_Kaseya/
GitHub
GitHub - cado-security/DFIR_Resources_REvil_Kaseya: Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya…
Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack - cado-security/DFIR_Resources_REvil_Kaseya
Brute Ratel v0.5.0 (Syndicate) is now available for download and provides a major update towards several features and the user interface of Brute Ratel. Commander comes with a new user interface providing a much more granular information on the metadata of the C4 features which can be seen in the figure below.
New Shellcode and DLL Loader
PowerShell Payload
Windows Remote Management (WinRM) Pivoting
Windows Management Instrumentation Queries and Pivots
LDAP Sentinel Re-Write and Raw Queries
Mimikatz
DCSync
Share Enumeration
AMSI and ETW Patching
Click Scripting and Automation
Commander
https://bruteratel.com/release/2021/07/03/Release-Syndicate/
#PostExploit #BRc4
New Shellcode and DLL Loader
PowerShell Payload
Windows Remote Management (WinRM) Pivoting
Windows Management Instrumentation Queries and Pivots
LDAP Sentinel Re-Write and Raw Queries
Mimikatz
DCSync
Share Enumeration
AMSI and ETW Patching
Click Scripting and Automation
Commander
https://bruteratel.com/release/2021/07/03/Release-Syndicate/
#PostExploit #BRc4
Brute Ratel C4
Release v0.5 - Syndicate
Brute Ratel v0.5.0 (Syndicate) is now available for download and provides a major update towards several features and the user interface of Brute Ratel. Commander comes with a new user interface providing a much more granular information on the metadata of…
Disabling spooler on just your DC's is not enough #PrintNightmare
https://threadreaderapp.com/thread/1411364227089117185.html
https://threadreaderapp.com/thread/1411364227089117185.html
Threadreaderapp
Thread by @cube0x0 on Thread Reader App
Thread by @cube0x0: Disabling spooler on just your DC's is not enough #PrintNightmare Quick testing from me and @filip_dragovic * NoWarningNoElevationOnInstall can be set to 0 * Authenticated users do not need to be...…
Reverse Engineers' Hex Editor
Large (1TB+) file support
Decoding of integer/floating point value types
Inline disassembly of machine code
Highlighting and annotation of ranges of bytes
Side by side comparision of selections
Lua scripting support
Virtual address mapping support
https://github.com/solemnwarning/rehex
Large (1TB+) file support
Decoding of integer/floating point value types
Inline disassembly of machine code
Highlighting and annotation of ranges of bytes
Side by side comparision of selections
Lua scripting support
Virtual address mapping support
https://github.com/solemnwarning/rehex
GitHub
GitHub - solemnwarning/rehex: Reverse Engineers' Hex Editor
Reverse Engineers' Hex Editor. Contribute to solemnwarning/rehex development by creating an account on GitHub.
Free
کورس مجانی زمان محدود
The OWASP top 10 demystified
https://www.udemy.com/course/the-owasp-top-10-demystified/?couponCode=81E0D38A002319EAD0B1
#bugbounty
کورس مجانی زمان محدود
The OWASP top 10 demystified
https://www.udemy.com/course/the-owasp-top-10-demystified/?couponCode=81E0D38A002319EAD0B1
#bugbounty
Udemy
Online Courses - Learn Anything, On Your Schedule | Udemy
Udemy is an online learning and teaching marketplace with over 250,000 courses and 80 million students. Learn programming, marketing, data science and more.
Here it is ! End of #printnightmare ? Some links are down, but we can hope for something... in next hours?
بالاخره پچ داد !
Microsoft has released updates to protect against CVE-2021-34527. Please see:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
#patch
https://blog.peneter.com/printnightmare-0day/
https://blog.peneter.com/printnightmare-patched/
بالاخره پچ داد !
Microsoft has released updates to protect against CVE-2021-34527. Please see:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
#patch
https://blog.peneter.com/printnightmare-0day/
https://blog.peneter.com/printnightmare-patched/
Peneter.com
آسیب پذیری Printnightmare و وصله امنیتی (Patch) - Peneter.com
داستان از جایی شروع شد که آقای zhiniang peng به اشتباه توییتی مبنی بر POC این آسیبپذیری ارسال کرد، در صورتی که طبق گفتهاش میخواسته...
Sharperner - Simple Executable Generator With Encrypted Shellcode
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass signature check but I cant be sure it can bypass heuristic scanning.
https://github.com/aniqfakhrul/Sharperner
#redteaming
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass signature check but I cant be sure it can bypass heuristic scanning.
https://github.com/aniqfakhrul/Sharperner
#redteaming
GitHub
GitHub - aniqfakhrul/Sharperner: Simple executable generator with encrypted shellcode.
Simple executable generator with encrypted shellcode. - aniqfakhrul/Sharperner
ورژن جدید mimikatz منتشر شد برای بعد از اپدیت جدید🔓
پ.ن :مایکروسافت اپدیت که داده فقط برای rce هست و LPE بعد اپدیت هم کار میکند
https://github.com/gentilkiwi/mimikatz/releases
#printnightmare
پ.ن :مایکروسافت اپدیت که داده فقط برای rce هست و LPE بعد اپدیت هم کار میکند
https://github.com/gentilkiwi/mimikatz/releases
#printnightmare
GitHub
Releases · gentilkiwi/mimikatz
A little tool to play with Windows security. Contribute to gentilkiwi/mimikatz development by creating an account on GitHub.
Media is too big
VIEW IN TELEGRAM
https://www.youtube.com/watch?v=kO_um6uWEZ4
https://www.clubhouse.com/join/penetercom/dU4Ss8mT/M43qzGYk
شنبه ۱۹ تیر روی اسیب پذیری صحبت میکنیم و همچنین روش های mitigation
ساعت ۲۳ به وقت ایران
#printnightmare
https://www.clubhouse.com/join/penetercom/dU4Ss8mT/M43qzGYk
شنبه ۱۹ تیر روی اسیب پذیری صحبت میکنیم و همچنین روش های mitigation
ساعت ۲۳ به وقت ایران
#printnightmare
In May of 2021, Microsoft released a patch to correct CVE-2021-28474, a remote code execution bug in supported versions of Microsoft SharePoint Server.
https://www.zerodayinitiative.com/blog/2021/7/7/cve-2021-28474-sharepoint-remote-code-execution-via-server-side-control-interpretation-conflict
https://www.zerodayinitiative.com/blog/2021/7/7/cve-2021-28474-sharepoint-remote-code-execution-via-server-side-control-interpretation-conflict
Technical Advisory – Arbitrary File Read in Dell Wyse Management Suite (CVE-2021-21586, CVE-2021-21587)
https://research.nccgroup.com/2021/07/06/technical-advisory-arbitrary-file-read-in-dell-wyse-management-suite-cve-2021-21586-cve-2021-21587/amp/?__twitter_impression=true
https://research.nccgroup.com/2021/07/06/technical-advisory-arbitrary-file-read-in-dell-wyse-management-suite-cve-2021-21586-cve-2021-21587/amp/?__twitter_impression=true
NCC Group Research
Technical Advisory – Arbitrary File Read in Dell Wyse Management Suite (CVE-2021-21586, CVE-2021-21587)
NCC Group Technical Advisory - Arbitrary File Read in Dell Wyse Management Suite (CVE-2021-21586, CVE-2021-21587)
Microsoft: PrintNightmare security updates work, start patching!
توضیحات مایکروسافت در مورد پچ قابل بایپس
https://www.bleepingcomputer.com/news/security/microsoft-printnightmare-security-updates-work-start-patching/amp/?__twitter_impression=true
#printnightmare
توضیحات مایکروسافت در مورد پچ قابل بایپس
https://www.bleepingcomputer.com/news/security/microsoft-printnightmare-security-updates-work-start-patching/amp/?__twitter_impression=true
#printnightmare
BleepingComputer
Microsoft: PrintNightmare security updates work, start patching!
Microsoft says the emergency security updates released at the start of the week correctly patch the PrintNightmare Print Spooler vulnerability for all supported Windows versions and urges users to start applying the updates as soon as possible.
SoheilSec
Microsoft: PrintNightmare security updates work, start patching! توضیحات مایکروسافت در مورد پچ قابل بایپس https://www.bleepingcomputer.com/news/security/microsoft-printnightmare-security-updates-work-start-patching/amp/?__twitter_impression=true #printnightmare
Benjamin Delpy :
Clarified Guidance for CVE-2021-34527 #printnightmare So I presume all is OK, and:
- you will not change UNC path detection
-RestrictDriverInstallation To Administrators & driver no exploitation? It's not, and you know it
===
As I test it LPE work after Patch deploy it so for apply patch u should follow Microsoft steps and change the registry.
طبق تستی که بعد از نصب پچ انجام دادم اکسپلویت کار میکنه و شما باید حتما تغییرات در رجیستری که مایکروسافت گفته انجام بدید.
https://lnkd.in/eJYGz6P
https://lnkd.in/eW-UWGi
#infosec #0day #microsoft #OOB #printspooler
Clarified Guidance for CVE-2021-34527 #printnightmare So I presume all is OK, and:
- you will not change UNC path detection
-RestrictDriverInstallation To Administrators & driver no exploitation? It's not, and you know it
===
As I test it LPE work after Patch deploy it so for apply patch u should follow Microsoft steps and change the registry.
طبق تستی که بعد از نصب پچ انجام دادم اکسپلویت کار میکنه و شما باید حتما تغییرات در رجیستری که مایکروسافت گفته انجام بدید.
https://lnkd.in/eJYGz6P
https://lnkd.in/eW-UWGi
#infosec #0day #microsoft #OOB #printspooler
Twitter
🥝 Benjamin Delpy
Clarified Guidance for CVE-2021-34527 #printnightmare So I presume all is OK, and: - you will not change UNC path detection - RestrictDriverInstallationToAdministrators & driver no explaination? ➡️It's not, and you know it > msrc-blog.microsoft.com/2021/07/08/cla…
چرا از ویندوز 11 استفاده نکنیم :) ؟
Previous WhyNotWin11 Releases Vulnerable to DLL Hijacking, Privilege Escalation
https://github.com/rcmaehl/WhyNotWin11/wiki/Vulnerability-Disclosure-07-09-2021
https://github.com/rcmaehl/WhyNotWin11
Previous WhyNotWin11 Releases Vulnerable to DLL Hijacking, Privilege Escalation
https://github.com/rcmaehl/WhyNotWin11/wiki/Vulnerability-Disclosure-07-09-2021
https://github.com/rcmaehl/WhyNotWin11
GitHub
Vulnerability Disclosure 07 09 2021
Detection Script to help identify why your PC isn't Windows 11 Release Ready - rcmaehl/WhyNotWin11
UDP Technology IP Camera vulnerabilities
آسیب پذیری های روی سری دوربین های UDP technology
سری دوربین ها :
Geutebruck
Ganz
Visualint
Cap
THRIVE Intelligence
Sophus
VCA
TripCorps
Sprinx Technologies
Smartec
Riva
https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/
#RCE #IPCAMERA #udptechnology
آسیب پذیری های روی سری دوربین های UDP technology
سری دوربین ها :
Geutebruck
Ganz
Visualint
Cap
THRIVE Intelligence
Sophus
VCA
TripCorps
Sprinx Technologies
Smartec
Riva
https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/
#RCE #IPCAMERA #udptechnology
Microsoft Teams user enumeration :
https://www.immunit.ch/blog/2021/07/05/microsoft-teams-user-enumeration/
https://github.com/immunIT/TeamsUserEnum
all the ways i use to hunt for BAC and IDOR vulnerabilities
https://thexssrat.iss.onedium.com/broken-access-control-beyond-the-basics-6e15078392b7
#bugbounty
Global Phishing Campaign Targets Energy Sector and its Suppliers
شرح کامل سناریو مهندسی اجتماعی از طریق فیشینگ روی شرکت های نفتی
https://www.intezer.com/blog/research/global-phishing-campaign-targets-energy-sector-and-its-suppliers/
A series of free interactive AWS security training modules that teach developers how to identify and mitigate security vulnerabilities in their AWS hosted cloud applications.
سری اموزش رایگان امنیت AWS
https://application.security/free/kontra-aws-clould-top-10
WATCH OUT!
روش های ران شدن ماکرو حتی بدون اینکه فعال باشد! نتیجه ارسال رزومه به شرکت ها و سازمان و دسترسی گرفتن از اونهاست
Hackers have been found to use a new technique to completely disable macro security warnings in Office files—without requiring user interaction—and infect victims' computers with #malware.
https://thehackernews.com/2021/07/hackers-use-new-trick-to-disable-macro.html
آسیب پذیری روی دستگاه های IoT پزشکی
Multiple vulnerabilities have been disclosed in Philips Clinical Collaboration Platform Portal ( aka Vue PACS medical imaging systems), some of which could be exploited by an attacker to take control of an affected system.
https://thehackernews.com/2021/07/critical-flaws-reported-in-philips-vue.html
https://www.immunit.ch/blog/2021/07/05/microsoft-teams-user-enumeration/
https://github.com/immunIT/TeamsUserEnum
all the ways i use to hunt for BAC and IDOR vulnerabilities
https://thexssrat.iss.onedium.com/broken-access-control-beyond-the-basics-6e15078392b7
#bugbounty
Global Phishing Campaign Targets Energy Sector and its Suppliers
شرح کامل سناریو مهندسی اجتماعی از طریق فیشینگ روی شرکت های نفتی
https://www.intezer.com/blog/research/global-phishing-campaign-targets-energy-sector-and-its-suppliers/
A series of free interactive AWS security training modules that teach developers how to identify and mitigate security vulnerabilities in their AWS hosted cloud applications.
سری اموزش رایگان امنیت AWS
https://application.security/free/kontra-aws-clould-top-10
WATCH OUT!
روش های ران شدن ماکرو حتی بدون اینکه فعال باشد! نتیجه ارسال رزومه به شرکت ها و سازمان و دسترسی گرفتن از اونهاست
Hackers have been found to use a new technique to completely disable macro security warnings in Office files—without requiring user interaction—and infect victims' computers with #malware.
https://thehackernews.com/2021/07/hackers-use-new-trick-to-disable-macro.html
آسیب پذیری روی دستگاه های IoT پزشکی
Multiple vulnerabilities have been disclosed in Philips Clinical Collaboration Platform Portal ( aka Vue PACS medical imaging systems), some of which could be exploited by an attacker to take control of an affected system.
https://thehackernews.com/2021/07/critical-flaws-reported-in-philips-vue.html
GitHub
GitHub - immunIT/TeamsUserEnum: User enumeration with Microsoft Teams API
User enumeration with Microsoft Teams API. Contribute to immunIT/TeamsUserEnum development by creating an account on GitHub.
Biden cancels $10billion cloud-computing contract awarded to Microsoft.
https://www.cybersecurity-insiders.com/biden-cancels-10billion-cloud-computing-contract-awarded-to-microsoft/
#microsoft
#mimikatz update new function for #printnightmare
https://video.twimg.com/tweet_video/E5451-oWQAYrXZr.mp4
Remote Desktop Vulnerabilities: What You Need to Know
1- Encryption Issues in Earlier Versions
2- Weak Password Practices
3- Unsecured Port Access
4- Clipboard Exploits
5- Buffer Overflow
https://www.cybersecurity-insiders.com/remote-desktop-vulnerabilities-what-you-need-to-know/
#RDP #EXPLOIT #SECURE #HARDENING
The malware is capable of replacing the victim’s wallet address with one provided by its author(s).
hiveos ?
https://hiveos.farm/features/
https://www.hackread.com/hive-os-cryptomining-malware-steal-wallet-funds/
#MINEROS #WAllet #Crypto
Flaw in preprocessor language Less.js causes website to leak AWS secret keys
https://portswigger.net/daily-swig/flaw-in-preprocessor-language-less-js-causes-website-to-leak-aws-secret-keys
#AWS #vulnerablity #XSS #RCE
How to protect your site against lethal unauthorized code injections
https://cybersecurity.att.com/blogs/security-essentials/how-to-protect-your-site-against-lethal-unauthorized-code-injections
#infosec #cybersecurity
How To Use the MITRE ATT&CK Framework
https://www.chaossearch.io/blog/how-to-use-mitre-attck-framework
#MITREGUIDE
Surveilling the Gamers: Privacy Impacts of the Video Game Industry
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3881279
#paper #Gamming #privacy
Windows Feature Hunter (WFH) is a proof of concept python script that uses Frida, a dynamic instrumentation toolkit, to assist in potentially identifying common “vulnerabilities” or “features” within Windows executables. WFH currently has the capability to automatically identify potential Dynamic Linked Library (DLL) sideloading and Component Object Model (COM) hijacking opportunities at scale.
https://github.com/ConsciousHacker/WFH
#pentesttool #windows #dllhijacking #WFH
Ipa-medit is a memory search and patch tool for resigned ipa without jailbreak. It was created for mobile game security testing.
https://github.com/aktsk/ipa-medit
#forensic #ipa #ios #memory #ipamedit
Modular brute force tool written in Python, for very fast password spraying SSH, and in the near future other network services.
https://github.com/Cerbrutus-BruteForcer/cerbrutus
#bruteforce #python
Account Takeovers — Believe the Unbelievable
https://blog.niksthehacker.com/account-takeovers-believe-the-unbelievable-bb98a0c251a4
#writeup #bugbountytips
Behind the Scene : HTTP Parameter Pollution
https://infosecwriteups.com/behind-the-scene-http-parameter-pollution-534b4fa2449c
#writeup #bugbountytips
https://www.cybersecurity-insiders.com/biden-cancels-10billion-cloud-computing-contract-awarded-to-microsoft/
#microsoft
#mimikatz update new function for #printnightmare
https://video.twimg.com/tweet_video/E5451-oWQAYrXZr.mp4
Remote Desktop Vulnerabilities: What You Need to Know
1- Encryption Issues in Earlier Versions
2- Weak Password Practices
3- Unsecured Port Access
4- Clipboard Exploits
5- Buffer Overflow
https://www.cybersecurity-insiders.com/remote-desktop-vulnerabilities-what-you-need-to-know/
#RDP #EXPLOIT #SECURE #HARDENING
The malware is capable of replacing the victim’s wallet address with one provided by its author(s).
hiveos ?
https://hiveos.farm/features/
https://www.hackread.com/hive-os-cryptomining-malware-steal-wallet-funds/
#MINEROS #WAllet #Crypto
Flaw in preprocessor language Less.js causes website to leak AWS secret keys
https://portswigger.net/daily-swig/flaw-in-preprocessor-language-less-js-causes-website-to-leak-aws-secret-keys
#AWS #vulnerablity #XSS #RCE
How to protect your site against lethal unauthorized code injections
https://cybersecurity.att.com/blogs/security-essentials/how-to-protect-your-site-against-lethal-unauthorized-code-injections
#infosec #cybersecurity
How To Use the MITRE ATT&CK Framework
https://www.chaossearch.io/blog/how-to-use-mitre-attck-framework
#MITREGUIDE
Surveilling the Gamers: Privacy Impacts of the Video Game Industry
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3881279
#paper #Gamming #privacy
Windows Feature Hunter (WFH) is a proof of concept python script that uses Frida, a dynamic instrumentation toolkit, to assist in potentially identifying common “vulnerabilities” or “features” within Windows executables. WFH currently has the capability to automatically identify potential Dynamic Linked Library (DLL) sideloading and Component Object Model (COM) hijacking opportunities at scale.
https://github.com/ConsciousHacker/WFH
#pentesttool #windows #dllhijacking #WFH
Ipa-medit is a memory search and patch tool for resigned ipa without jailbreak. It was created for mobile game security testing.
https://github.com/aktsk/ipa-medit
#forensic #ipa #ios #memory #ipamedit
Modular brute force tool written in Python, for very fast password spraying SSH, and in the near future other network services.
https://github.com/Cerbrutus-BruteForcer/cerbrutus
#bruteforce #python
Account Takeovers — Believe the Unbelievable
https://blog.niksthehacker.com/account-takeovers-believe-the-unbelievable-bb98a0c251a4
#writeup #bugbountytips
Behind the Scene : HTTP Parameter Pollution
https://infosecwriteups.com/behind-the-scene-http-parameter-pollution-534b4fa2449c
#writeup #bugbountytips
Cybersecurity Insiders
Biden cancels $10billion cloud-computing contract awarded to Microsoft. - Cybersecurity Insiders
Microsoft has lost a $10 billion worth cloud computing contract awarded to it by the Donald Trump government a couple of years ago. And the Biden Administration issued orders related to the cancellation at the end of last week, thus ending the Joint Enterprise…
👍1
Peneter =>
https://blog.peneter.com
@learnpentest
@Peneter_News
@Peneter_Media
@Peneter_Tools
@peneter_com Q&A
https://discord.gg/h7VqYzfuje Q&A | present
https://bit.ly/3xLwfaT کلاب هاوس شنبه ها به وقت ایران 19:30 تا 20:30
https://www.instagram.com/peneter_admin/
Youtube video : https://www.youtube.com/channel/UCewDE8winhc8DSPFnpSksTA/featured
https://blog.peneter.com
@learnpentest
@Peneter_News
@Peneter_Media
@Peneter_Tools
@peneter_com Q&A
https://discord.gg/h7VqYzfuje Q&A | present
https://bit.ly/3xLwfaT کلاب هاوس شنبه ها به وقت ایران 19:30 تا 20:30
https://www.instagram.com/peneter_admin/
Youtube video : https://www.youtube.com/channel/UCewDE8winhc8DSPFnpSksTA/featured
Peneter.com
Penetration Tester
❤1