#exploit
Seamlessly Discovering Netgear Universal Plug-and-Pwn (UPnP) 0-days (Netgear UPNP Stack Based Buffer Overflow)
https://blog.grimm-co.com/2021/11/seamlessly-discovering-netgear.html
@BlueRedTeam
Seamlessly Discovering Netgear Universal Plug-and-Pwn (UPnP) 0-days (Netgear UPNP Stack Based Buffer Overflow)
https://blog.grimm-co.com/2021/11/seamlessly-discovering-netgear.html
@BlueRedTeam
Hello friends
You can download Cybersecurity books here.
And various articles and Write ups
Link:
https://news.1rj.ru/str/joinchat/S7X_g5M43myDbccu
You can download Cybersecurity books here.
And various articles and Write ups
Link:
https://news.1rj.ru/str/joinchat/S7X_g5M43myDbccu
#exploit
1. CVE-2021-43617:
Bypass CRF
https://github.com/kombat1/CVE-2021-43617
2. Linux: UAF read: SO_PEERCRED
and SO_PEERGROUPS race with listen() (and connect())
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230
3. CVE-2021-37580:
Apache ShenYu 2.3.0/2.4.0 authentication bypass
https://github.com/0x0021h/expbox/blob/main/cve-2021-37580-poc.py
@BlueRedTeam
1. CVE-2021-43617:
Bypass CRF
https://github.com/kombat1/CVE-2021-43617
2. Linux: UAF read: SO_PEERCRED
and SO_PEERGROUPS race with listen() (and connect())
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230
3. CVE-2021-37580:
Apache ShenYu 2.3.0/2.4.0 authentication bypass
https://github.com/0x0021h/expbox/blob/main/cve-2021-37580-poc.py
@BlueRedTeam
GitHub
GitHub - kombat1/CVE-2021-43617: CVE-2021-43617 bypass CRF
CVE-2021-43617 bypass CRF. Contribute to kombat1/CVE-2021-43617 development by creating an account on GitHub.
#RedTeam
1. Google SSRF - URL whitelist bypass
https://feed.bugs.xdavidhu.me/bugs/0008
2. HTTP Request Smuggling due to ignoring chunk extensions
https://hackerone.com/reports/1238099
3. How I was able to revoke your Instagram 2FA
https://dhiyaneshgeek.github.io/web/security/2021/10/23/how-i-was-able-to-revoke-your-instagram-2fa
@BlueRedTeam
1. Google SSRF - URL whitelist bypass
https://feed.bugs.xdavidhu.me/bugs/0008
2. HTTP Request Smuggling due to ignoring chunk extensions
https://hackerone.com/reports/1238099
3. How I was able to revoke your Instagram 2FA
https://dhiyaneshgeek.github.io/web/security/2021/10/23/how-i-was-able-to-revoke-your-instagram-2fa
@BlueRedTeam
feed.bugs.xdavidhu.me
SSRF via URL whitelist bypass in a Google Cloud owned App Engine service
xdavidhu's bug bounty disclosures.
#tools
#BlueTeam
Microsoft Threat Intelligence Security Tools
for InfoSec defenders
https://github.com/microsoft/msticpy
@BlueRedTeam
#BlueTeam
Microsoft Threat Intelligence Security Tools
for InfoSec defenders
https://github.com/microsoft/msticpy
@BlueRedTeam
GitHub
GitHub - microsoft/msticpy: Microsoft Threat Intelligence Security Tools
Microsoft Threat Intelligence Security Tools. Contribute to microsoft/msticpy development by creating an account on GitHub.
دوستانی ک به
❗️ هک
❗️کرک
❗️مهندسی معکوس
❗️نتورک
❗️مباحث جنگ الکترونیک
❗️و ...
علاقه مندن، جوین بشن 👇 :
@ch4mr0sh 🦹
❗️ هک
❗️کرک
❗️مهندسی معکوس
❗️نتورک
❗️مباحث جنگ الکترونیک
❗️و ...
علاقه مندن، جوین بشن 👇 :
@ch4mr0sh 🦹
#RedTeam
1. Bypassing ModSecurity WAF
https://blog.h3xstream.com/2021/10/bypassing-modsecurity-waf.html
2. Finding a 0-Day Race Condition
https://www.mccormackcyber.com/post/finding-a-0-day-race-condition
@BlueRedTeam
1. Bypassing ModSecurity WAF
https://blog.h3xstream.com/2021/10/bypassing-modsecurity-waf.html
2. Finding a 0-Day Race Condition
https://www.mccormackcyber.com/post/finding-a-0-day-race-condition
@BlueRedTeam
H3Xstream
h3xStream's blog: Bypassing ModSecurity WAF
Being able to bypass Web Application Firewall (WAF) depends on your knowledge about their behavior. Here is a cool technique th...
#tools
#BlueTeam
A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending
https://github.com/dev-2null/ADCollector
@BlueRedTeam
#BlueTeam
A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending
https://github.com/dev-2null/ADCollector
@BlueRedTeam
GitHub
GitHub - dev-2null/ADCollector: A lightweight tool to quickly extract valuable information from the Active Directory environment…
A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending. - dev-2null/ADCollector
برای دوستانی که علاقه مند به یاد گیری تست نفوذ هستند و در سطح مقدماتی هستند :
( هدف این کانال یاد دادن تست نفوذ شبکه هست . )
@Unique_exploit
( هدف این کانال یاد دادن تست نفوذ شبکه هست . )
@Unique_exploit
#tools
#RedTeam
1. Lsass NTLM Authentication Backdoor
https://github.com/kindtime/nosferatu
2. Cobalt Strike Aggressor Script that Performs
System/AV/EDR Recon
https://github.com/optiv/Registry-Recon
@BlueRedTeam
#RedTeam
1. Lsass NTLM Authentication Backdoor
https://github.com/kindtime/nosferatu
2. Cobalt Strike Aggressor Script that Performs
System/AV/EDR Recon
https://github.com/optiv/Registry-Recon
@BlueRedTeam
GitHub
GitHub - kindtime/nosferatu: Windows NTLM Authentication Backdoor
Windows NTLM Authentication Backdoor. Contribute to kindtime/nosferatu development by creating an account on GitHub.
#exploit
1. CVE-2021-42321:
Exchange Post-Auth RCE
https://gist.github.com/testanull/0188c1ae847f37a70fe536123d14f398
2. CVE-2021-22053:
Spring Cloud Netflix Hystrix Dashboard
template resolution vulnerability
https://github.com/SecCoder-Security-Lab/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053
@BlueRedTeam
1. CVE-2021-42321:
Exchange Post-Auth RCE
https://gist.github.com/testanull/0188c1ae847f37a70fe536123d14f398
2. CVE-2021-22053:
Spring Cloud Netflix Hystrix Dashboard
template resolution vulnerability
https://github.com/SecCoder-Security-Lab/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053
@BlueRedTeam
Gist
PoC of CVE-2021-42321: pop mspaint.exe on the target
PoC of CVE-2021-42321: pop mspaint.exe on the target - CVE-2021-42321_poc.py
#BlueTeam
1. Command injection prevention for Python
https://semgrep.dev/docs/cheat-sheets/python-command-injection
2. Defender’s Mindset
https://medium.com/@johnlatwc/defenders-mindset-319854d10aaa
@BlueRedTeam
1. Command injection prevention for Python
https://semgrep.dev/docs/cheat-sheets/python-command-injection
2. Defender’s Mindset
https://medium.com/@johnlatwc/defenders-mindset-319854d10aaa
@BlueRedTeam
semgrep.dev
Command Injection in Python | Semgrep
Cheat sheet for the prevention of Command Injection vulnerabilities for Python.
#exploit
CVE-2021-41379:
Windows installer LPE 0day
https://github.com/klinix5/InstallerFileTakeOver
@BlueRedTeam
CVE-2021-41379:
Windows installer LPE 0day
https://github.com/klinix5/InstallerFileTakeOver
@BlueRedTeam
#Threat_Research
1. Unauthenticated RCE against CommVault Command Center
https://srcincite.io/blog/2021/11/22/unlocking-the-vault.html
]-> PoC: https://srcincite.io/pocs/cve-2021-%7B34993,34996%7D.py.txt
2. A review of Microsoft Azure Sphere vulnerabilities
https://blog.talosintelligence.com/2021/11/a-review-of-azure-sphere.html?m=1
3. Exploiting the Qualcomm NPU (neural processing unit) kernel driver (CVE-2021-1940, CVE-2021-1968, CVE-2021-1969)
https://securitylab.github.com/research/qualcomm_npu
@BlueRedTeam
1. Unauthenticated RCE against CommVault Command Center
https://srcincite.io/blog/2021/11/22/unlocking-the-vault.html
]-> PoC: https://srcincite.io/pocs/cve-2021-%7B34993,34996%7D.py.txt
2. A review of Microsoft Azure Sphere vulnerabilities
https://blog.talosintelligence.com/2021/11/a-review-of-azure-sphere.html?m=1
3. Exploiting the Qualcomm NPU (neural processing unit) kernel driver (CVE-2021-1940, CVE-2021-1968, CVE-2021-1969)
https://securitylab.github.com/research/qualcomm_npu
@BlueRedTeam
CVE-2021
Python 3 noscript to identify CVE-2021-26084 via network requests.
URL:https://github.com/quesodipesto/conflucheck
@BlueRedTeam
Python 3 noscript to identify CVE-2021-26084 via network requests.
URL:https://github.com/quesodipesto/conflucheck
@BlueRedTeam
GitHub
GitHub - quesodipesto/conflucheck: Python 3 noscript to identify CVE-2021-26084 via network requests.
Python 3 noscript to identify CVE-2021-26084 via network requests. - quesodipesto/conflucheck
Red Team
A collection of Python noscripts for Red Teaming or otherwise
URL:https://github.com/wethered/offensive-noscripts
@BlueRedTeam
A collection of Python noscripts for Red Teaming or otherwise
URL:https://github.com/wethered/offensive-noscripts
@BlueRedTeam
GitHub
GitHub - rivet1337/offensive-noscripts: A collection of Python noscripts for Red Teaming or otherwise
A collection of Python noscripts for Red Teaming or otherwise - GitHub - rivet1337/offensive-noscripts: A collection of Python noscripts for Red Teaming or otherwise
#exploit
CVE-2021-43557:
Apache APISIX: Path traversal in request_uri variable
https://xvnpw.github.io/posts/cve_2021_43557_apache_apisix_path_traversal_in_request_uri_variable
]-> PoC:
https://github.com/xvnpw/k8s-CVE-2021-43557-poc
@BlueRedTeam
CVE-2021-43557:
Apache APISIX: Path traversal in request_uri variable
https://xvnpw.github.io/posts/cve_2021_43557_apache_apisix_path_traversal_in_request_uri_variable
]-> PoC:
https://github.com/xvnpw/k8s-CVE-2021-43557-poc
@BlueRedTeam
xvnpw personal blog
CVE-2021-43557: Apache APISIX: Path traversal in request_uri variable
In this article I will present my research on insecure usage of $request_uri variable in Apache APISIX ingress controller. My work end up in submit of security vulnerability, which was positively confirmed and got CVE-2021-43557. At the end of article I will…
#RedTeam
RCE with SSRF and File Write as an exploit chain
on Apache Guacamole
https://thinkloveshare.com/hacking/hacking_guacamole_to_trigger_avocado
@BlueRedTeam
RCE with SSRF and File Write as an exploit chain
on Apache Guacamole
https://thinkloveshare.com/hacking/hacking_guacamole_to_trigger_avocado
@BlueRedTeam
Thinkloveshare
RCE with SSRF and File Write as an exploit chain on Apache Guacamole
While doing research on various topics, I stood upon Guacamole, a software that can be used as a connection bastion or protocolar gateway. It has many original vulnerabilities that lead to a Remote Code Execution once chained. Let's begin, shall we?
منابع تست نفوذ شبکه و امنیت شبکه :
@NetPentester
Network penetration testing resources and network security :
@NetPentesters
@NetPentester
Network penetration testing resources and network security :
@NetPentesters
#RedTeam
Download Linux & Windows Binaries/Scripts used for Red Teaming & Pentesting
https://github.com/mashm3ll0w/pentest-tool
@BlueRedTeam
Download Linux & Windows Binaries/Scripts used for Red Teaming & Pentesting
https://github.com/mashm3ll0w/pentest-tool
@BlueRedTeam