Exploiting Bitdefender Antivirus: RCE from any website
https://palant.info/2020/06/22/exploiting-bitdefender-antivirus-rce-from-any-website/
https://palant.info/2020/06/22/exploiting-bitdefender-antivirus-rce-from-any-website/
Almost Secure
Exploiting Bitdefender Antivirus: RCE from any website
A vulnerability in Bitdefender Antivirus allowed any website to run arbitrary code with user's privileges. This was caused by issues very similar to ones found in other antivirus products before.
Securing Active Directory: Performing an Active Directory Security Review
https://www.hub.trimarcsecurity.com/post/securing-active-directory-performing-an-active-directory-security-review
https://www.hub.trimarcsecurity.com/post/securing-active-directory-performing-an-active-directory-security-review
Trimarc Content Hub
Securing Active Directory: Performing an Active Directory Security Review
During the Trimarc Webcast on June 17, 2020, Sean Metcalf covered a number of Active Directory (AD) components and areas that should be reviewed for potential security issues. The presentation included PowerShell code in the presentation and that code is…
Leonidas, a tool for automating the simulation of attacks against cloud environment
https://github.com/FSecureLABS/leonidas
https://github.com/FSecureLABS/leonidas
GitHub
GitHub - WithSecureLabs/leonidas: Automated Attack Simulation in the Cloud, complete with detection use cases.
Automated Attack Simulation in the Cloud, complete with detection use cases. - GitHub - WithSecureLabs/leonidas: Automated Attack Simulation in the Cloud, complete with detection use cases.
Taking over Azure DevOps Accounts with 1 Click
https://blog.assetnote.io/2020/06/28/subdomain-takeover-to-account-takeover/?v=2
https://blog.assetnote.io/2020/06/28/subdomain-takeover-to-account-takeover/?v=2
SMBleedingGhost Writeup Part III: From Remote Read (SMBleed) to RCE
https://blog.zecops.com/vulnerabilities/smbleedingghost-writeup-part-iii-from-remote-read-smbleed-to-rce/
https://blog.zecops.com/vulnerabilities/smbleedingghost-writeup-part-iii-from-remote-read-smbleed-to-rce/
Jamf
Jamf Threat Labs | Blog
GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions
https://gtfobins.github.io/
https://gtfobins.github.io/
Story of stealing mail conversation, contacts in mail.ru and myMail iOS applications via XSS
https://medium.com/@kminthein/story-of-stealing-mail-conversation-contacts-in-mail-ru-and-mymail-ios-applications-via-xss-1e49c4ed560
https://medium.com/@kminthein/story-of-stealing-mail-conversation-contacts-in-mail-ru-and-mymail-ios-applications-via-xss-1e49c4ed560
Medium
Story of stealing mail conversation, contacts in mail.ru and myMail iOS applications via XSS
In June 2020, I found a stored XSS bug that could allow an attacker to steal user email conversations, contacts in mail.ru and myMail iOS…
Living Off Windows Land – A New Native File “downldr”
https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/
https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/
SentinelOne
Living Off Windows Land - A New Native File "downldr" - SentinelLabs
A newly discovered LOLBin offers an alternative to certutil for helping adversaries download files from a remote server. Meet desktopimgdownldr.exe.
Restricting SMB-based lateral movement in a Windows environment
https://medium.com/palantir/restricting-smb-based-lateral-movement-in-a-windows-environment-ed033b888721
https://medium.com/palantir/restricting-smb-based-lateral-movement-in-a-windows-environment-ed033b888721
Medium
Restricting SMB-based lateral movement in a Windows environment
Palantir’s recommendations for defending your network
CreateFile based rootkit. NtCreateFile can create and access directories using names like " ." but CreateFile can't do it.
https://github.com/dalvarezperez/CreateFile_based_rootkit
https://github.com/dalvarezperez/CreateFile_based_rootkit
GitHub
GitHub - dalvarezperez/CreateFile_based_rootkit
Contribute to dalvarezperez/CreateFile_based_rootkit development by creating an account on GitHub.
An exploitation case study of CVE-2020-1062, a use-after-free vulnerability in IE11
https://www.accenture.com/us-en/blogs/cyber-defense/exploitation-case-study-cve-2020-1062-vulnerability-in-ie11
https://www.accenture.com/us-en/blogs/cyber-defense/exploitation-case-study-cve-2020-1062-vulnerability-in-ie11
Accenture
Accenture | Security Solutions
Make every part of your business more resilient.