نظارت امنیتی در سراسر Azure Ad و Active Directory
https://github.com/Cloud-Architekt/AzureAD-Attack-Defense/blob/main/IdentitySecurityMonitoring.md
#Azure
#ad
@NetPentester
https://github.com/Cloud-Architekt/AzureAD-Attack-Defense/blob/main/IdentitySecurityMonitoring.md
#Azure
#ad
@NetPentester
Pre-Auth SSRF To Full MailBox Access
(Microsoft Exchange Server Exploit)
https://vanshal.medium.com/pre-auth-ssrf-to-full-mailbox-access-microsoft-exchange-server-exploit-a62c8ac04b47
#SSRF
#Microsoft
#exchange
@NetPentester
(Microsoft Exchange Server Exploit)
https://vanshal.medium.com/pre-auth-ssrf-to-full-mailbox-access-microsoft-exchange-server-exploit-a62c8ac04b47
#SSRF
#Microsoft
#exchange
@NetPentester
پیاده سازی پایتون برای سوء استفاده از گواهی Active Directory
https://github.com/ollypwn/Certipy
#python
#Ad
@NetPentester
https://github.com/ollypwn/Certipy
#python
#Ad
@NetPentester
PowerShell Red Team Enum.
مجموعه توابع PowerShell که Red Teamer ممکن است برای جمع آوری داده ها از دستگاه یا دسترسی به هدف استفاده کند. فایلهای ps1 را برای دستوراتی که در ماژول RedTeamEnum موجود است اضافه کردم. این به شما این امکان را می دهد که به راحتی تنها یک دستور را پیدا کرده و از آن استفاده کنید. اگر می خواهید کل ماژول پس از بارگیری فهرست و محتویات RedTeamEnum در دستگاه خود ، اقدامات زیر را انجام دهید.
https://github.com/tobor88/PowerShell-Red-Team
#powershell
@NetPentester
مجموعه توابع PowerShell که Red Teamer ممکن است برای جمع آوری داده ها از دستگاه یا دسترسی به هدف استفاده کند. فایلهای ps1 را برای دستوراتی که در ماژول RedTeamEnum موجود است اضافه کردم. این به شما این امکان را می دهد که به راحتی تنها یک دستور را پیدا کرده و از آن استفاده کنید. اگر می خواهید کل ماژول پس از بارگیری فهرست و محتویات RedTeamEnum در دستگاه خود ، اقدامات زیر را انجام دهید.
https://github.com/tobor88/PowerShell-Red-Team
#powershell
@NetPentester
GitHub
GitHub - tobor88/PowerShell-Red-Team: Collection of PowerShell functions a Red Teamer may use in an engagement
Collection of PowerShell functions a Red Teamer may use in an engagement - tobor88/PowerShell-Red-Team
Azure Privilege Escalation via Service Principal Abuse
https://posts.specterops.io/azure-privilege-escalation-via-service-principal-abuse-210ae2be2a5
#Azure
#privilege
@NetPentester
https://posts.specterops.io/azure-privilege-escalation-via-service-principal-abuse-210ae2be2a5
#Azure
#privilege
@NetPentester
SpecterOps
Blog - SpecterOps
Your new best friend: Introducing BloodHound Community Edition!
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
https://github.com/bhdresh/CVE-2021-33766
#exchange
#bypass
@NetPentester
https://github.com/bhdresh/CVE-2021-33766
#exchange
#bypass
@NetPentester
GitHub
GitHub - bhdresh/CVE-2021-33766: ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit - bhdresh/CVE-2021-33766
Offensive WMI: Reconnaissance & Enumeration
https://0xinfection.github.io/posts/wmi-recon-enum
#WMI
#Enumeration
#Reconnaissance
@NetPentester
https://0xinfection.github.io/posts/wmi-recon-enum
#WMI
#Enumeration
#Reconnaissance
@NetPentester
Network Penetration Testing
Offensive WMI: Reconnaissance & Enumeration https://0xinfection.github.io/posts/wmi-recon-enum #WMI #Enumeration #Reconnaissance @NetPentester
Offensive WMI:
Part 1 - Basics
https://0xinfection.github.io/posts/wmi-basics-part-1
Part 2 - Exploring Namespaces, Classes & Methods
https://0xinfection.github.io/posts/wmi-classes-methods-part-2
Part 3 - Interacting with Windows Registry
https://0xinfection.github.io/posts/wmi-registry-part-3
#WMI
@NetPentester
Part 1 - Basics
https://0xinfection.github.io/posts/wmi-basics-part-1
Part 2 - Exploring Namespaces, Classes & Methods
https://0xinfection.github.io/posts/wmi-classes-methods-part-2
Part 3 - Interacting with Windows Registry
https://0xinfection.github.io/posts/wmi-registry-part-3
#WMI
@NetPentester
Active Directory Enumeration
https://0xinfection.github.io/posts/wmi-ad-enum
#AD
#Enumeration
#Microsoft
@NetPentester
https://0xinfection.github.io/posts/wmi-ad-enum
#AD
#Enumeration
#Microsoft
@NetPentester
حمله و ایمن سازی اکتیو دایرکتوری
https://rmusser.net/docs/Active_Directory.html
#Ad
#Pentest
#attack
@NetPentester
https://rmusser.net/docs/Active_Directory.html
#Ad
#Pentest
#attack
@NetPentester
BLE Passkey Bruteforce Attack
https://insinuator.net/2021/10/change-your-ble-passkey-like-you-change-your-underwear
]-> PoC:
https://github.com/ttdennis/bluetooth_smp_pocs
https://insinuator.net/2021/10/change-your-ble-passkey-like-you-change-your-underwear
]-> PoC:
https://github.com/ttdennis/bluetooth_smp_pocs
Attacking Azure/Azure AD
https://hausec.com/2021/10/26/attacking-azure-azure-ad-part-ii
#cloud
#Ad
#azure
@NetPentester
https://hausec.com/2021/10/26/attacking-azure-azure-ad-part-ii
#cloud
#Ad
#azure
@NetPentester
hausec
Attacking Azure & Azure AD, Part II
Abstract When I published my first article, Attacking Azure & Azure AD and Introducing PowerZure, I had no idea I was just striking the tip of the iceberg. Over the past eight months, my co-wor…
Full-featured C2 framework which silently persists
on webserver with a single-line PHP backdoor
https://github.com/nil0x42/phpsploit
#C2
#backdoor
@NetPentester
on webserver with a single-line PHP backdoor
https://github.com/nil0x42/phpsploit
#C2
#backdoor
@NetPentester
GitHub
GitHub - nil0x42/phpsploit: Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor - nil0x42/phpsploit
Best of OSCP CTF Cheat Sheet.
https://github.com/Ignitetechnologies/Privilege-Escalation
https://github.com/Ignitetechnologies/HackTheBox-CTF-Writeups
https://github.com/Ignitetechnologies/Vulnhub-CTF-Writeups
https://github.com/Ignitetechnologies/TryHackMe-CTF-Writeups
#CTF #OSCP #Cheatsheet
https://github.com/Ignitetechnologies/Privilege-Escalation
https://github.com/Ignitetechnologies/HackTheBox-CTF-Writeups
https://github.com/Ignitetechnologies/Vulnhub-CTF-Writeups
https://github.com/Ignitetechnologies/TryHackMe-CTF-Writeups
#CTF #OSCP #Cheatsheet
GitHub
GitHub - Ignitetechnologies/Privilege-Escalation: This cheasheet is aimed at the CTF Players and Beginners to help them understand…
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples. - Ignitetechnologies/Privilege-Escalation
Windows & Active Directory Exploitation Cheat Sheet
and Command Reference
https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference
#AD
#pentest
@NetPentester
and Command Reference
https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference
#AD
#pentest
@NetPentester
Cas van Cooten
Windows & Active Directory Exploitation Cheat Sheet and Command Reference
Last update: November 3rd, 2021
Updated November 3rd, 2021: Included several fixes and actualized some techniques. Changes made to the Defender evasion, RBCD, Domain Enumeration, Rubeus, and Mimikatz sections. Fixed some whoopsies as well 🙃.
Updated June…
Updated November 3rd, 2021: Included several fixes and actualized some techniques. Changes made to the Defender evasion, RBCD, Domain Enumeration, Rubeus, and Mimikatz sections. Fixed some whoopsies as well 🙃.
Updated June…
Microsoft Exchange vulnerabilities exploited once again
for ransomware, this time with Babuk
https://blog.talosintelligence.com/2021/11/babuk-exploits-exchange.html?m=1
#Malware
#exchange
#microsoft
@NetPentester
for ransomware, this time with Babuk
https://blog.talosintelligence.com/2021/11/babuk-exploits-exchange.html?m=1
#Malware
#exchange
#microsoft
@NetPentester
AD Enum - pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos
https://github.com/SecuProject/ADenum
Python implementation for Active Directory certificate abuse
https://github.com/ly4k/Certipy
@NetPentester
https://github.com/SecuProject/ADenum
Python implementation for Active Directory certificate abuse
https://github.com/ly4k/Certipy
@NetPentester
GitHub
GitHub - SecuProject/ADenum: AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and…
AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos. - SecuProject/ADenum
Practical HTTP Header Smuggling:
Sneaking Past Reverse Proxies to Attack AWS
https://www.intruder.io/research/practical-http-header-smuggling
ChaosDB Explained: Azure's Cosmos DB Vulnerability Walkthrough
https://www.wiz.io/blog/chaosdb-explained-azures-cosmos-db-vulnerability-walkthrough
#Cloud
#azure
#Vulnerability
@NetPentester
Sneaking Past Reverse Proxies to Attack AWS
https://www.intruder.io/research/practical-http-header-smuggling
ChaosDB Explained: Azure's Cosmos DB Vulnerability Walkthrough
https://www.wiz.io/blog/chaosdb-explained-azures-cosmos-db-vulnerability-walkthrough
#Cloud
#azure
#Vulnerability
@NetPentester
www.intruder.io
Practical HTTP Header Smuggling: Sneaking Past Reverse Proxies to Attack AWS and Beyond
Modern web applications typically rely on chains of multiple servers, which forward HTTP requests to one another. The attack surface created by this forwarding is increasingly receiving more attention, including the recent popularisation of cache poisoning...
Thick Client Penetration Testing Methodology
https://www.cyberark.com/resources/threat-research-blog/thick-client-penetration-testing-methodology
#RedTeam
#pentest
@NetPentester
https://www.cyberark.com/resources/threat-research-blog/thick-client-penetration-testing-methodology
#RedTeam
#pentest
@NetPentester
مجموعه نقشه ذهنی تست نفوذ Active Directory توسط Orange CyberDefense
GitHub
https://github.com/Orange-Cyberdefense/arsenal
All MindMap
https://github.com/Orange-Cyberdefense/arsenal/tree/master/mindmap
Additional
https://www.xmind.net/m/5dypm8/
#pentest
#windows
#ad
@NetPentester
GitHub
https://github.com/Orange-Cyberdefense/arsenal
All MindMap
https://github.com/Orange-Cyberdefense/arsenal/tree/master/mindmap
Additional
https://www.xmind.net/m/5dypm8/
#pentest
#windows
#ad
@NetPentester
GitHub
GitHub - Orange-Cyberdefense/arsenal: Arsenal is just a quick inventory and launcher for hacking programs
Arsenal is just a quick inventory and launcher for hacking programs - Orange-Cyberdefense/arsenal