Attacking Active Directory
https://zer1t0.gitlab.io/posts/attacking_ad/
https://zer1t0.gitlab.io/posts/attacking_ad/
From Binary Patch to Proof-of-concept: a VMware ESXi vmxnet3 Case Study https://zerodayengineering.com/research/vmware-esxi-vmxnet3-from-patch-to-poc.html
Exploiting custom protocol handlers for cross-browser tracking in Tor, Safari, Chrome and Firefox
https://fingerprintjs.com/blog/external-protocol-flooding/
https://fingerprintjs.com/blog/external-protocol-flooding/
Fingerprint
Cross-browser tracking vulnerability in Tor, Safari, Chrome, and Firefox
Unveiling a scheme flooding vulnerability across major browsers. Learn how it threatens anonymous browsing.
Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf
https://github.com/BC-SECURITY/Invoke-ZeroLogon
https://github.com/BC-SECURITY/Invoke-ZeroLogon
GitHub
GitHub - BC-SECURITY/Invoke-ZeroLogon: Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller…
Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf. - BC-SECURITY/Invoke-ZeroLogon
CVE-2021-31166: A Wormable Code Execution Bug in HTTP.sys
https://www.zerodayinitiative.com/blog/2021/5/17/cve-2021-31166-a-wormable-code-execution-bug-in-httpsys
https://www.zerodayinitiative.com/blog/2021/5/17/cve-2021-31166-a-wormable-code-execution-bug-in-httpsys
Zero Day Initiative
Zero Day Initiative — CVE-2021-31166: A Wormable Code Execution Bug in HTTP.sys
In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Kc Udonsi and Yazhi Wang of the Trend Micro Research Team detail a recent code execution vulnerability in the Microsoft Internet Information Services (IIS) for Windows.…