Network Penetration Testing – Telegram
Network Penetration Testing
1.03K subscribers
40 photos
3 videos
12 files
269 links
[ Network Penetration Testing & Cloud ]

Any misuse of this info will not be the responsibility of the author, educational purposes only.


@NetPentester
Download Telegram
MITRE ATT&CK TTP’s used by LAPSUS$

Two interesting techniques used by LAPSUS$ (Code Signing, Disable, and Modify Tools)

#MITRE
@NetPentesters
Vulnerable Active Directory
Create a vulnerable AD that will allow you to test most AD attacks in a local lab

Main characteristics:
- Random attacks
- Full coverage of the listed attacks
- it is necessary to run the noscript in DC with Active Directory installed
- Some attacks require a client workstation
Supported attacks:
- Abuse of ACLs/ACEs
- Kerberoasting
- AS-REP Roasting
- Abuse of DnsAdmins
- Password in object denoscription
- Custom objects with default password (Changeme123!)
- Password spraying
- DCSync
- Silver ticket
- Golden Ticket
- Pass-the-Hash
- Pass-the-Ticket
- SMB signing disabled

https://github.com/WazeHell/vulnerable-AD

#Ad
#Lab
@NetPentesters
NTLMRelay2Self

Escalate privileges locally by forcing the system you landed initial access on to reflectively authenticate over HTTP to itself and forward the received connection to an HTTP listener (ntlmrelayx) configured to relay to DC servers over LDAP/LDAPs for either setting shadow credentials or configuring RBCD.

#LDAP
#privesc
#relay
#webdav
#lpe
https://github.com/med0x2e/NTLMRelay2Self
@NetPentesters
RCE in BIG-IP iControl REST (CVE-2022-1388)

This vulnerability could allow an unauthenticated attacker with network access to a BIG-IP system to execute arbitrary system commands, create or delete files, or disable services (CVE-2022-1388)

Dork for Shodan:

http.noscript:"BIG-IP®-+Redirect" +"Server"

https://github.com/sherlocksecurity/CVE-2022-1388_F5_BIG-IP

#web
#cve
#rce
@NetPentesters