Red Blue Team – Telegram
Red Blue Team
5.04K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
#PTH
​OverPass-the-Hash in 1C Enterprise

To gain access to 1C Enterprise, you need a username and password. In case 1C works with LDAP authentication and you only have the user's NTLM hash, you can use Rubeus to launch 1C using the OverPass-the-Hash attack. Thus, you can access 1C Enterprise without having a password in the plaintext.

Invoke-Rubeus -Command "asktgt /user:i.ivanov /domain:APTNOTES.LOCAL /rc4:A87F3A337D73085C45F9416BE5787D86 /createnetonly:C:\1cestart.exe /show"

Bonus:
If the compromised user has permissions to run "External data processors", you can get a reverse shell of the 1C server.
https://github.com/KraudSecurity/1C-Exploit-Kit/tree/master/1C-Shell

@BlueRedTeam
#exploit
Use-After-Free Exploit
in HackSysExtremeVulnerableDriver
https://sophieboyle.github.io/2022/04/09/HEVD-UAF-Exploit.html

@BlueRedTeam
#exploit
+ bluez: malicious USB devices can steal Bluetooth link keys over HCI using fake BD_ADDR, plus bluetoothd double-free
https://bugs.chromium.org/p/project-zero/issues/detail?id=2256

+ CVE-2022-0995:
Linux: watch_queue filter OOB write (and other bugs)
https://bugs.chromium.org/p/project-zero/issues/detail?id=2274

@BlueRedTeam
#CVE-2022

This repository contains a PoC for remote code execution CVE-2022-26809

https://github.com/DESC0N0C1D0/CVE-2022-26809-RCE

@BlueRedTeam