Red Blue Team – Telegram
Red Blue Team
5.14K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
Forwarded from CyberSecurityResearch
Apache’s Fix for Log4Shell Can Lead to DoS Attacks

Not only is the jaw-dropping flaw in the Apache Log4j logging library ubiquitous; Apache’s blanket of a quickly baked patch for Log4Shell also has holes.

https://threatpost.com/apache-patch-log4shell-log4j-dos-attacks/177064/

#Log4Shell
@PentesterReference
#Red_Team

1. Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token Impersonation
https://github.com/FULLSHADE/Auto-Elevate
2. AutoSUID is the project, the main idea of which is to automate harvesting the SUID executable files and to find
a way for further escalating the privileges
https://github.com/IvanGlinkin/AutoSUID

@BlueRedTeam
#CVE-2021
#Log4j
CVE-2021-44228 vulnerability in Apache Log4j library

https://github.com/Heliferepo/log4j

@BlueRedTeam
#CVE-2021
#Log4Shell
Java application vulnerable to the CVE-2021-44228 (a.k.a log4shell) vulnerability

https://github.com/GroupePSA/log4shell-honeypot

@BlueRedTeam
#CVE-2021
#Log4j
The noscript \"Py3-detect-log4j-12.2021.py\" developed in Python 3 is responsible for detecting whether a list of URLs are vulnerable to CVE-2021-44228.

https://github.com/nx6110a5100/Py3-detect-log4j-12.2021

@BlueRedTeam