آسیب پذیری 0 day در دستگاه های Tp-link wi-fi
https://securityaffairs.co/wordpress/125016/hacking/0-day-tp-link-wi-fi-6.html?utm_source=feedly&utm_medium=rss&utm_campaign=0-day-tp-link-wi-fi-6
TP-Link TL-WR840N EU v5 RCE
(PoC for CVE-2021-41653)
https://k4m1ll0.com/cve-2021-41653.html
#tplink
#ZeroDay
#Vulnerability
#poc
@NetPentester
https://securityaffairs.co/wordpress/125016/hacking/0-day-tp-link-wi-fi-6.html?utm_source=feedly&utm_medium=rss&utm_campaign=0-day-tp-link-wi-fi-6
TP-Link TL-WR840N EU v5 RCE
(PoC for CVE-2021-41653)
https://k4m1ll0.com/cve-2021-41653.html
#tplink
#ZeroDay
#Vulnerability
#poc
@NetPentester
Owfuzz: a WiFi protocol fuzzing tool using openwifi
https://github.com/alipay/Owfuzz
#tools
@NetPentester
https://github.com/alipay/Owfuzz
#tools
@NetPentester
اسکریپت Nmap که آسیب پذیری های احتمالی را بر اساس سرویس های کشف شده در پورت های باز جستجو می کند.
https://github.com/scmanjarrez/CVEScannerV2
#Nmap
#port
#Vulnerability
#Script
@NetPentester
https://github.com/scmanjarrez/CVEScannerV2
#Nmap
#port
#Vulnerability
#Script
@NetPentester
GitHub
GitHub - scmanjarrez/CVEScannerV2: Nmap noscript that scans for probable vulnerabilities based on services discovered in open ports.
Nmap noscript that scans for probable vulnerabilities based on services discovered in open ports. - GitHub - scmanjarrez/CVEScannerV2: Nmap noscript that scans for probable vulnerabilities based on se...
Proxy-Attackchain:
proxylogon, proxyshell, proxyoracle, proxytoken
full chain exploit tool
https://github.com/FDlucifer/Proxy-Attackchain
#tools
#proxy
@NetPentester
proxylogon, proxyshell, proxyoracle, proxytoken
full chain exploit tool
https://github.com/FDlucifer/Proxy-Attackchain
#tools
#proxy
@NetPentester
افزایش دسترسی Azure از طریق سوء استفاده از مجوزهای Azure API
https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48
#microsoft
#api
#Azure
#privilege
#Cloud
@NetPentesters
https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48
#microsoft
#api
#Azure
#privilege
#Cloud
@NetPentesters
تجزیه و تحلیل برای CVE-2021-34535 -
آسیب پذیری RCE در Remote Desktop Client
https://www.synack.com/blog/this-microsoft-windows-rce-vulnerability-gives-an-attacker-complete-control
#vulnerability
#RDP
#RCE
#Analysis
@NetPentester
آسیب پذیری RCE در Remote Desktop Client
https://www.synack.com/blog/this-microsoft-windows-rce-vulnerability-gives-an-attacker-complete-control
#vulnerability
#RDP
#RCE
#Analysis
@NetPentester
کانفیگ بک دور برای دور زدن انتی ویروس
https://github.com/RoseSecurity/Anti-Virus-Evading-Payloads
#Bypass
#antivirus
#backdoor
@NetPentester
https://github.com/RoseSecurity/Anti-Virus-Evading-Payloads
#Bypass
#antivirus
#backdoor
@NetPentester
Airstrike - Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
https://github.com/redcode-lab/AirStrike
#tools
#wpa
#airstrike
@NetPentester
https://github.com/redcode-lab/AirStrike
#tools
#wpa
#airstrike
@NetPentester
Cloud service provider security mistakes
https://github.com/SummitRoute/csp_security_mistakes
#Cloud
@NetPentester
https://github.com/SummitRoute/csp_security_mistakes
#Cloud
@NetPentester
GitHub
GitHub - SummitRoute/csp_security_mistakes: This repo has been replaced by https://www.cloudvulndb.org
This repo has been replaced by https://www.cloudvulndb.org - SummitRoute/csp_security_mistakes
MikroTik_vulns.pdf
555.4 KB
Most exploited vulnerabilities of MikroTik devices, 2021.
#Analytics
#Mikrotik
#vulnerability
@NetPentester
#Analytics
#Mikrotik
#vulnerability
@NetPentester
آسیبپذیریهای مایکروسافت و پیاده سازی GitHub OAuth منجر به حملات تغییر مسیر میشوند.
https://www.proofpoint.com/us/blog/cloud-security/microsoft-and-github-oauth-implementation-vulnerabilities-lead-redirection
#Microsoft
#vulnerability
@NetPentester
https://www.proofpoint.com/us/blog/cloud-security/microsoft-and-github-oauth-implementation-vulnerabilities-lead-redirection
#Microsoft
#vulnerability
@NetPentester
CVE-2021-42287
Weaponisation - Active Directory
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
#AD
#cve
@NetPentester
Weaponisation - Active Directory
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
#AD
#cve
@NetPentester
پیاده سازی پایتون برای CVE-2021-42278 (افزایش دسترسی اکتیو دایرکتوری)
https://github.com/ly4k/Pachine
#cve
#privilege
#AD
#python
@NetPentester
https://github.com/ly4k/Pachine
#cve
#privilege
#AD
#python
@NetPentester
Hypervisor compromises using Azure Run Command
https://www.mandiant.com/resources/azure-run-command-dummies
#Cloud
#Azure
@NetPentester
https://www.mandiant.com/resources/azure-run-command-dummies
#Cloud
#Azure
@NetPentester
Thirumalai_Khanna.pdf
3.6 MB
"Who Owns Your Hybrid Active Directory? Hunting for Adversary Techniques", 2021.
#cloud
#ad
@NetPentester
#cloud
#ad
@NetPentester
Active Directory Lateral Movement
https://research.splunk.com/stories/active_directory_lateral_movement
#Blue_Team
#AD
@NetPentester
https://research.splunk.com/stories/active_directory_lateral_movement
#Blue_Team
#AD
@NetPentester
Splunk Security Content
Analytics Story: Active Directory Lateral Movement
Date: 2021-12-09 ID: 399d65dc-1f08-499b-a259-aad9051f38ad Author: David Dorsey, Mauricio Velazco Splunk Product: Splunk Enterprise Security Denoscription Detect and investigate tactics, techniques, and procedures around how attackers move laterally within an…
نفوذ به شبکه های هسته 5G از خارج و داخل
https://penthertz.com/blog/Intruding-5G-core-networks-from-outside-and_inside.html
#5G
#Network
#Network_5G
@NetPentester
https://penthertz.com/blog/Intruding-5G-core-networks-from-outside-and_inside.html
#5G
#Network
#Network_5G
@NetPentester
ابزار Powershell برای خودکار کردن شمارش اکتیو دایرکتوری
https://github.com/61106960/adPEAS#simple-usage-with-generic-program-parameters
#PowerShell
#RedTeam
#AD
@NetPentester
https://github.com/61106960/adPEAS#simple-usage-with-generic-program-parameters
#PowerShell
#RedTeam
#AD
@NetPentester
GitHub
GitHub - 61106960/adPEAS: Powershell tool to automate Active Directory enumeration.
Powershell tool to automate Active Directory enumeration. - 61106960/adPEAS