Media is too big
VIEW IN TELEGRAM
#Red_Team
"Red team: pentest with two contractors at the same time"
Language : Russian
#Video #Pentest
@BlueRedTeam
"Red team: pentest with two contractors at the same time"
Language : Russian
#Video #Pentest
@BlueRedTeam
#tools
Tool and technique to punch holes through firewalls/NATs where both clients and server can be behind separate NATs without any 3rd party involvement. Pwnat uses a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, router administrative requirements, STUN/TURN/UPnP/ICE
https://github.com/samyk/pwnat
@BlueRedTeam
Tool and technique to punch holes through firewalls/NATs where both clients and server can be behind separate NATs without any 3rd party involvement. Pwnat uses a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, router administrative requirements, STUN/TURN/UPnP/ICE
https://github.com/samyk/pwnat
@BlueRedTeam
GitHub
GitHub - samyk/pwnat: The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind…
The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed techn...
🔥2
#Red_Team
1. HTB: Overflow
https://0xdf.gitlab.io/2022/04/09/htb-overflow.html
2. Exploiting CVE-2022-0778, a bug in OpenSSL vis-à-vis WebRTC platforms
https://www.rtcsec.com/article/exploiting-cve-2022-0778-in-openssl-vs-webrtc-platforms
@BlueRedTeam
1. HTB: Overflow
https://0xdf.gitlab.io/2022/04/09/htb-overflow.html
2. Exploiting CVE-2022-0778, a bug in OpenSSL vis-à-vis WebRTC platforms
https://www.rtcsec.com/article/exploiting-cve-2022-0778-in-openssl-vs-webrtc-platforms
@BlueRedTeam
0xdf hacks stuff
HTB: Overflow
Overflow starts with a padding oracle attack on a cookie for a website. I’ll get to do some need cookie analysis before employing padbuster to decrypt the cookie and forge a new admin one. As admin, I get access to a logs panel with an SQL injection, where…
#tools
#Red_Team
1. Quickly discover exposed hosts on the internet using multiple search engine
https://github.com/projectdiscovery/uncover
2. A hacking tool (Reverse shell) based on python-3
https://github.com/JosephFrankFir/Rxploit
@BlueRedTeam
#Red_Team
1. Quickly discover exposed hosts on the internet using multiple search engine
https://github.com/projectdiscovery/uncover
2. A hacking tool (Reverse shell) based on python-3
https://github.com/JosephFrankFir/Rxploit
@BlueRedTeam
GitHub
GitHub - projectdiscovery/uncover: Quickly discover exposed hosts on the internet using multiple search engines.
Quickly discover exposed hosts on the internet using multiple search engines. - projectdiscovery/uncover
👍1
#Blue_Team
1. Firewall analysis: A portable graph based approach
https://diablohorn.com/2022/04/09/firewall-analysis-a-portable-graph-based-approach
2. Analyzing the Exploitation of Spring4Shell Vulnerability (CVE-2022-22965) in Weaponizing and Executing the Mirai Botnet Malware
https://www.trendmicro.com/en_us/research/22/d/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html
@BlueRedTeam
1. Firewall analysis: A portable graph based approach
https://diablohorn.com/2022/04/09/firewall-analysis-a-portable-graph-based-approach
2. Analyzing the Exploitation of Spring4Shell Vulnerability (CVE-2022-22965) in Weaponizing and Executing the Mirai Botnet Malware
https://www.trendmicro.com/en_us/research/22/d/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html
@BlueRedTeam
DiabloHorn
Firewall analysis: A portable graph based approach
Sometimes you are asked to perform a firewall analysis to determine if the configuration can be improved upon to reduce the ability for an attacker to move laterally through the network or identify…
#CVE-2022
CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager
https://github.com/Vulnmachines/VMWare_CVE-2022-22954
@BlueRedTeam
CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager
https://github.com/Vulnmachines/VMWare_CVE-2022-22954
@BlueRedTeam
GitHub
GitHub - Vulnmachines/VMWare_CVE-2022-22954: CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace…
CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager - Vulnmachines/VMWare_CVE-2022-22954
#Cobalt_Strike
描述:通过反射DLL注入、Win API、C#、通过API建立用户、删除、dumphash、开启3389,计划任务、启动项、通过dll加载,让文件不落地。增加隐蔽效果。 同时快速运行frp实现内网穿透,实现Cobalt Strike插件化
https://github.com/n1n1tom/cstools
@BlueRedTeam
描述:通过反射DLL注入、Win API、C#、通过API建立用户、删除、dumphash、开启3389,计划任务、启动项、通过dll加载,让文件不落地。增加隐蔽效果。 同时快速运行frp实现内网穿透,实现Cobalt Strike插件化
https://github.com/n1n1tom/cstools
@BlueRedTeam
#exploit
CVE-2022-22954:
VMware Workspace ONE Access Freemarker Server-side Template Injection
https://github.com/sherlocksecurity/VMware-CVE-2022-22954
@BlueRedTeam
CVE-2022-22954:
VMware Workspace ONE Access Freemarker Server-side Template Injection
https://github.com/sherlocksecurity/VMware-CVE-2022-22954
@BlueRedTeam
GitHub
GitHub - sherlocksecurity/VMware-CVE-2022-22954: POC for VMWARE CVE-2022-22954
POC for VMWARE CVE-2022-22954. Contribute to sherlocksecurity/VMware-CVE-2022-22954 development by creating an account on GitHub.
#tools
LogMePwn is a fully automated, multi-protocol, reliable, super-fast scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability
https://github.com/0xInfection/LogMePwn
@BlueRedTeam
LogMePwn is a fully automated, multi-protocol, reliable, super-fast scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability
https://github.com/0xInfection/LogMePwn
@BlueRedTeam
GitHub
GitHub - 0xInfection/LogMePwn: A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021…
A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability. - 0xInfection/LogMePwn
#CVE-2022
PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection
https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC
@BlueRedTeam
PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection
https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC
@BlueRedTeam
GitHub
GitHub - DrorDvash/CVE-2022-22954_VMware_PoC: PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template…
PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection - DrorDvash/CVE-2022-22954_VMware_PoC
#CVE-2022
CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本
https://github.com/bewhale/CVE-2022-22954
@BlueRedTeam
CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本
https://github.com/bewhale/CVE-2022-22954
@BlueRedTeam
GitHub
GitHub - bewhale/CVE-2022-22954: CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入
CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入 - bewhale/CVE-2022-22954
#Red_Team
Polymorphic code obfuscator for use in Red Team operations
https://github.com/maltek-labs/Malcode-Obfuscator
@IotPenetrationTesting
Polymorphic code obfuscator for use in Red Team operations
https://github.com/maltek-labs/Malcode-Obfuscator
@IotPenetrationTesting
GitHub
GitHub - maltek-labs/Malcode-Obfuscator: Polymorphic code obfuscator for use in Red Team operations
Polymorphic code obfuscator for use in Red Team operations - maltek-labs/Malcode-Obfuscator
#Blue_Team
Building Blue Team Home Lab
Part 1 - Introduction
https://facyber.me/posts/blue-team-lab-guide-part-1
Part 2 - Network Topology
https://facyber.me/posts/blue-team-lab-guide-part-2
Part 3 - Deploying a firewall
https://facyber.me/posts/blue-team-lab-guide-part-3
@BlueRedTeam
Building Blue Team Home Lab
Part 1 - Introduction
https://facyber.me/posts/blue-team-lab-guide-part-1
Part 2 - Network Topology
https://facyber.me/posts/blue-team-lab-guide-part-2
Part 3 - Deploying a firewall
https://facyber.me/posts/blue-team-lab-guide-part-3
@BlueRedTeam
facyber
Building Blue Team Home Lab Part 1 - Introduction
For quite some time I have desired to create my own home lab dedicated to Blue Team. I also had the same desire to create one for Red Team but, it always ended up in having a single Kali Linux and maybe 1 or 2 machines, because I was always learning on online…
#Threat_Research
#SCADA_Security
APT Cyber Tools Targeting ICS/SCADA Devices
https://www.cisa.gov/uscert/ncas/alerts/aa22-103a
@BlueRedTeam
#SCADA_Security
APT Cyber Tools Targeting ICS/SCADA Devices
https://www.cisa.gov/uscert/ncas/alerts/aa22-103a
@BlueRedTeam
👍2
#exploit
Exploiting XSS with Javanoscript/JPEG Polyglot
https://systemweakness.com/exploiting-xss-with-javanoscript-jpeg-polyglot-4cff06f8201a
@BlueRedTeam
Exploiting XSS with Javanoscript/JPEG Polyglot
https://systemweakness.com/exploiting-xss-with-javanoscript-jpeg-polyglot-4cff06f8201a
@BlueRedTeam
Medium
Exploiting XSS with Javanoscript/JPEG Polyglot
What is a polyglot?
#CVE-2022
Proof of Concept for exploiting VMware CVE-2022-22954
https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector
@BlueRedTeam
Proof of Concept for exploiting VMware CVE-2022-22954
https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector
@BlueRedTeam
GitHub
GitHub - tyleraharrison/VMware-CVE-2022-22954-Command-Injector: Proof of Concept for exploiting VMware CVE-2022-22954
Proof of Concept for exploiting VMware CVE-2022-22954 - GitHub - tyleraharrison/VMware-CVE-2022-22954-Command-Injector: Proof of Concept for exploiting VMware CVE-2022-22954
Network Attack and Defense
The author is a senior in cybersecurity and is about to pursue a postgraduate study in a certain institution of the Chinese Academy of Sciences. He is very interested in cybersecurity and CTF. The fields of study include but are not limited to system security, red team attack and defense, etc. This repository will record his own growth process and careful attention to detail. Organize and study the collected materials. Welcome pr! These materials have basically been seen or are being studied by themselves~ They will give their own understanding of the materials, so they have relatively good reference value!
https://github.com/tangzichengcc/The_Growth_Path_Of_A_Pwner
@BlueRedTeam
The author is a senior in cybersecurity and is about to pursue a postgraduate study in a certain institution of the Chinese Academy of Sciences. He is very interested in cybersecurity and CTF. The fields of study include but are not limited to system security, red team attack and defense, etc. This repository will record his own growth process and careful attention to detail. Organize and study the collected materials. Welcome pr! These materials have basically been seen or are being studied by themselves~ They will give their own understanding of the materials, so they have relatively good reference value!
https://github.com/tangzichengcc/The_Growth_Path_Of_A_Pwner
@BlueRedTeam
GitHub
GitHub - tangzichengcc/The_Growth_Path_Of_A_CTFer_And_Pwner: 作者目前在中科院某所攻读研究生,对网络安全,CTF非常感兴趣.学习的领域包括但不限于PWN、系统安全、红队攻防等. 这个仓库会记…
作者目前在中科院某所攻读研究生,对网络安全,CTF非常感兴趣.学习的领域包括但不限于PWN、系统安全、红队攻防等. 这个仓库会记录自己的成长历程以及学习过程中整理的资料. - GitHub - tangzichengcc/The_Growth_Path_Of_A_CTFer_And_Pwner: 作者目前在中科院某所攻读研究生,对网络安全,CTF非常感兴趣.学习的领域包括但不限于PWN、系...
#Pentest
"Architect's Kung Fu" tutorial collection, article collection includes paradigm programming, microservices, essential algorithms, security attack and defense, assembly, crawler, reverse engineering, penetration testing...
https://github.com/xiaomiwujiecao/KongFuOfArchitect
@BlueRedTeam
"Architect's Kung Fu" tutorial collection, article collection includes paradigm programming, microservices, essential algorithms, security attack and defense, assembly, crawler, reverse engineering, penetration testing...
https://github.com/xiaomiwujiecao/KongFuOfArchitect
@BlueRedTeam
GitHub
GitHub - program-spiritual/KongFuOfArchitect: (Updating!) Architect's Kung Fu tutorial collection Article collection contains paradigm…
(Updating!) Architect's Kung Fu tutorial collection Article collection contains paradigm programming microservices essential algorithms Security attack Assembly Crawler Reverse penetration ...