Learning Linux kernel exploitation
Part 1 - Laying the groundwork
https://0x434b.dev/dabbling-with-linux-kernel-exploitation-ctf-challenges-to-learn-the-ropes
#linux
@NetPentesters
Part 1 - Laying the groundwork
https://0x434b.dev/dabbling-with-linux-kernel-exploitation-ctf-challenges-to-learn-the-ropes
#linux
@NetPentesters
Low-level adventures
Learning Linux kernel exploitation - Part 1 - Laying the groundwork
Table fo contents
Disclaimer: This post will cover basic steps to accomplish a privilege escalation based on a vulnerable driver. The basis for this introduction will be a challenge from the hxp2020 CTF called "kernel-rop". There's (obviously) write…
Disclaimer: This post will cover basic steps to accomplish a privilege escalation based on a vulnerable driver. The basis for this introduction will be a challenge from the hxp2020 CTF called "kernel-rop". There's (obviously) write…
The 8KB bypass in Google Cloud Platform WAF
https://kloudle.com/blog/piercing-the-cloud-armor-the-8kb-bypass-in-google-cloud-platform-waf
#Cloud
#WAF
@NetPentesters
https://kloudle.com/blog/piercing-the-cloud-armor-the-8kb-bypass-in-google-cloud-platform-waf
#Cloud
#WAF
@NetPentesters
Kloudle
Piercing the Cloud Armor: Exploiting the 8KB Bypass in Google Cloud Platform WAF
A detailed analysis of a critical security vulnerability in Google Cloud Platform's Web Application Firewall (WAF) that allows bypassing protection through an 8KB payload technique. Learn about the technical details, implications, and mitigation strategies.
Vajra is a UI based tool with multiple techniques for attacking/enumerating in target's Azure environment
https://github.com/TROUBLE-1/Vajra
#Azure
#Tools
@NetPentesters
https://github.com/TROUBLE-1/Vajra
#Azure
#Tools
@NetPentesters
GitHub
GitHub - TROUBLE-1/Vajra: Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure…
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the P...
Intrusion statistics aligned to the MITRE ATT&CK framework
https://thedfirreport.com/2022/03/07/2021-year-in-review
@NetPentesters
https://thedfirreport.com/2022/03/07/2021-year-in-review
@NetPentesters
The DFIR Report
2021 Year In Review
As we come to the end of the first quarter of 2022, we want to take some time to look back over our cases from 2021, in aggregate, and look at some of the top tactics, techniques and procedures (TT…
AutoWarp: Critical Cross-Account Vulnerability in Microsoft Azure Automation Service
https://orca.security/resources/blog/autowarp-microsoft-azure-automation-service-vulnerability
#Azure
#Vulnerability
@NetPentesters
https://orca.security/resources/blog/autowarp-microsoft-azure-automation-service-vulnerability
#Azure
#Vulnerability
@NetPentesters
Orca Security
AutoWarp: Azure Automation Vulnerability | Orca Research Pod
AutoWarp is a critical vulnerability in Microsoft Azure Automation Service that allows unauthorized access to other customer accounts using the service.
Azure Dominance Paths
https://cloudbrothers.info/en/azure-dominance-paths
#Cloud
#Azure
@NetPentesters
https://cloudbrothers.info/en/azure-dominance-paths
#Cloud
#Azure
@NetPentesters
cloudbrothers.info
Azure Attack Paths
Creating and maintaining a secure environment is hard. And with every technology or product added to your environment it gets more complicated. Microsoft Azure as a cloud environment is no exception to this rule and with the many services and features that…
Azure Dominance Paths
https://cloudbrothers.info/en/azure-dominance-paths/
#azure
#cloud
#AD
@NetPentesters
https://cloudbrothers.info/en/azure-dominance-paths/
#azure
#cloud
#AD
@NetPentesters
cloudbrothers.info
Azure Attack Paths
Creating and maintaining a secure environment is hard. And with every technology or product added to your environment it gets more complicated. Microsoft Azure as a cloud environment is no exception to this rule and with the many services and features that…
All MITM attacks in one place :
https://github.com/frostbits-security/MITM-cheatsheet
#MITM
#Cheatsheet
@NetPentesters
https://github.com/frostbits-security/MITM-cheatsheet
#MITM
#Cheatsheet
@NetPentesters
GitHub
GitHub - frostbits-security/MITM-cheatsheet: All MITM attacks in one place.
All MITM attacks in one place. Contribute to frostbits-security/MITM-cheatsheet development by creating an account on GitHub.
Resources for Kubernetes network policies
https://github.com/networkpolicy/community
#pollicies
@NetPentesters
https://github.com/networkpolicy/community
#pollicies
@NetPentesters
GitHub
GitHub - networkpolicy/community: Resources for Kubernetes network policies
Resources for Kubernetes network policies. Contribute to networkpolicy/community development by creating an account on GitHub.
LDAP relays for initial foothold in dire situations
https://offsec.almond.consulting/ldap-relays-for-initial-foothold-in-dire-situations.html
#LDAP
@NetPentesters
https://offsec.almond.consulting/ldap-relays-for-initial-foothold-in-dire-situations.html
#LDAP
@NetPentesters
Active Directory (Attack & Defense )
https://0xsp.com/offensive/active-directory-attack-defense
#AD
#Attack
#Defense
@NetPentesters
https://0xsp.com/offensive/active-directory-attack-defense
#AD
#Attack
#Defense
@NetPentesters
MITRE ATT&CK TTP’s used by LAPSUS$
Two interesting techniques used by LAPSUS$ (Code Signing, Disable, and Modify Tools)
#MITRE
@NetPentesters
Two interesting techniques used by LAPSUS$ (Code Signing, Disable, and Modify Tools)
#MITRE
@NetPentesters
Vulnerable Active Directory
Create a vulnerable AD that will allow you to test most AD attacks in a local lab
Main characteristics:
- Random attacks
- Full coverage of the listed attacks
- it is necessary to run the noscript in DC with Active Directory installed
- Some attacks require a client workstation
Supported attacks:
- Abuse of ACLs/ACEs
- Kerberoasting
- AS-REP Roasting
- Abuse of DnsAdmins
- Password in object denoscription
- Custom objects with default password (Changeme123!)
- Password spraying
- DCSync
- Silver ticket
- Golden Ticket
- Pass-the-Hash
- Pass-the-Ticket
- SMB signing disabled
https://github.com/WazeHell/vulnerable-AD
#Ad
#Lab
@NetPentesters
Create a vulnerable AD that will allow you to test most AD attacks in a local lab
Main characteristics:
- Random attacks
- Full coverage of the listed attacks
- it is necessary to run the noscript in DC with Active Directory installed
- Some attacks require a client workstation
Supported attacks:
- Abuse of ACLs/ACEs
- Kerberoasting
- AS-REP Roasting
- Abuse of DnsAdmins
- Password in object denoscription
- Custom objects with default password (Changeme123!)
- Password spraying
- DCSync
- Silver ticket
- Golden Ticket
- Pass-the-Hash
- Pass-the-Ticket
- SMB signing disabled
https://github.com/WazeHell/vulnerable-AD
#Ad
#Lab
@NetPentesters
GitHub
GitHub - safebuffer/vulnerable-AD: Create a vulnerable active directory that's allowing you to test most of the active directory…
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab - GitHub - safebuffer/vulnerable-AD: Create a vulnerable active directo...
Azure Active Directory Exposes Internal Information
https://www.secureworks.com/research/azure-active-directory-exposes-internal-information
#Cloud
#Azure
#AD
@NetPentesters
https://www.secureworks.com/research/azure-active-directory-exposes-internal-information
#Cloud
#Azure
#AD
@NetPentesters
Sophos
Azure Active Directory Exposes Internal Information - Threat Analysis
A threat actor can gather a significant amount of OSINT from an Azure AD tenant. Microsoft addressed all but two of the issues CTU researchers identified..
Performing and Preventing Attacks on Azure Cloud Environments through Azure DevOps
https://labs.f-secure.com/blog/performing-and-preventing-attacks-on-azure-cloud-environments-through-azure-devops
#Cloud
#Azure
@NetPentesters
https://labs.f-secure.com/blog/performing-and-preventing-attacks-on-azure-cloud-environments-through-azure-devops
#Cloud
#Azure
@NetPentesters
Active Directory Domain Service Bug Let Attackers To Takeover Windows Domains
https://gbhackers.com/active-directory-domain-service-bug/
#AD
@NetPentesters
https://gbhackers.com/active-directory-domain-service-bug/
#AD
@NetPentesters
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Active Directory Domain Service Bug Let Attackers To Takeover Windows Domains
AD bug detected recently by Andrew Bartlett of Catalyst IT, and these two security flaws allow hackers to take over Windows domains
A modern, simple TCP tunnel in Rust that exposes local ports to a remote server, bypassing standard NAT connection firewalls.
https://github.com/ekzhang/bore
#Bypass
#NAT
#Firewall
@NetPentesters
https://github.com/ekzhang/bore
#Bypass
#NAT
#Firewall
@NetPentesters
GitHub
GitHub - ekzhang/bore: 🕳 bore is a simple CLI tool for making tunnels to localhost
🕳 bore is a simple CLI tool for making tunnels to localhost - ekzhang/bore