HAFNIUM targeting Exchange Servers with 0-day exploits
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
Microsoft News
HAFNIUM targeting Exchange Servers with 0-day exploits
Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, threat actors used this vulnerability to access on-premises Exchange servers, which…
malicious repositories can execute remote code while cloning
https://www.openwall.com/lists/oss-security/2021/03/09/3
https://www.openwall.com/lists/oss-security/2021/03/09/3
Playing in the (Windows) Sandbox
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
Check Point Research
Playing in the (Windows) Sandbox - Check Point Research
Research By: Alex Ilgayev Introduction Two years ago, Microsoft released a new feature as a part of the Insiders build 18305 – Windows Sandbox. This sandbox has some useful specifications: Integrated part of Windows 10 (Pro/Enterprise). Runs on top of Hyper…
Reproducing n-day vulnerabilities and writing N-day based fuzzer with Qiling
https://devilinside.me/blogs/reproducing-ndays-qiling
https://devilinside.me/blogs/reproducing-ndays-qiling
devilinside.me
UNLEASH THE BEAST | THE FUTURE
Expect memes, food for thoughts, tech guidelines and trash talk daily.
Extracting and Diffing Windows Patches in 2020
https://wumb0.in/extracting-and-diffing-ms-patches-in-2020.html
https://wumb0.in/extracting-and-diffing-ms-patches-in-2020.html
Antivirus Event Analysis Cheat Sheet v1.8
https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
Analyzing attacks taking advantage of the Exchange Server vulnerabilities
https://www.microsoft.com/security/blog/2021/03/25/analyzing-attacks-taking-advantage-of-the-exchange-server-vulnerabilities/
https://www.microsoft.com/security/blog/2021/03/25/analyzing-attacks-taking-advantage-of-the-exchange-server-vulnerabilities/
Microsoft Security Blog
Analyzing attacks taking advantage of the Exchange Server vulnerabilities | Microsoft Security Blog
Microsoft continues to monitor and investigate attacks exploiting the recent on-premises Exchange Server vulnerabilities. As organizations recover from this incident, we continue to publish guidance and share threat intelligence to help detect and evict threat…
Dumping LSASS in memory undetected using MirrorDump
https://www.pentestpartners.com/security-blog/dumping-lsass-in-memory-undetected-using-mirrordump/
https://www.pentestpartners.com/security-blog/dumping-lsass-in-memory-undetected-using-mirrordump/
Pen Test Partners
Dumping LSASS in memory undetected using MirrorDump | Pen Test Partners
Introduction As I am sure some of you are aware from the occasional ramblings and screenshots on twitter, I am a big fan of .NET based offensive tooling. Not because it’s trendy or cool, but because of the development speed and ease of testing and debugging…
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
https://github.com/microsoft/CyberBattleSim
https://github.com/microsoft/CyberBattleSim
GitHub
GitHub - microsoft/CyberBattleSim: An experimentation and research platform to investigate the interaction of automated agents…
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments. - microsoft/CyberBattleSim
An excel-centric approach for managing the MITRE ATT&CK® tactics and techniques.
https://github.com/RealityNet/attack-coverage
https://github.com/RealityNet/attack-coverage
GitHub
GitHub - RealityNet/attack-coverage: an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques - GitHub - RealityNet/attack-coverage: an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
The
https://github.com/Forescout/project-memoria-detector
project-memoria-detector
tool aims to determine whether a target network device runs a specific embedded TCP/IP stack.https://github.com/Forescout/project-memoria-detector
GitHub
GitHub - Forescout/project-memoria-detector
Contribute to Forescout/project-memoria-detector development by creating an account on GitHub.
Bypassing LSA Protection in Userland
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/
Building on the Shoulders of Giants: Combining TensorFlow and Rust
https://www.crowdstrike.com/blog/how-crowdstrike-combines-tensorflow-and-rust-for-performance/
https://www.crowdstrike.com/blog/how-crowdstrike-combines-tensorflow-and-rust-for-performance/
crowdstrike.com
How CrowdStrike Combines TensorFlow and Rust for Performance
In this blog, we share our perspectives on combining Rust’s and TensorFlow's powerful capabilities to boost both memory performance and speed capability.
Analysis of Chromium issue 1196683, 1195777
https://iamelli0t.github.io/2021/04/20/Chromium-Issue-1196683-1195777.html
https://iamelli0t.github.io/2021/04/20/Chromium-Issue-1196683-1195777.html
iamelli0t’s blog
Analysis of Chromium issue 1196683, 1195777
On April 12, a code commit[1] in Chromium get people’s attention. This is a bugfix for some vulnerability in Chromium Javascript engine v8. At the same time, the regression test case regress-1196683.js for this bugfix was also submitted. Based on this regression…
Remote Potato – From Domain User to Enterprise Admin
https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/
https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/
Penetration Testing Lab
Remote Potato – From Domain User to Enterprise Admin
NTLM Relaying is an well-known technique that was mainly used in security assessments in order to establish some sort of foothold on a server in the network or used for privilege escalation scenari…