Network Penetration Testing – Telegram
Network Penetration Testing
1.03K subscribers
40 photos
3 videos
12 files
269 links
[ Network Penetration Testing & Cloud ]

Any misuse of this info will not be the responsibility of the author, educational purposes only.


@NetPentester
Download Telegram
NTLMRelay2Self

Escalate privileges locally by forcing the system you landed initial access on to reflectively authenticate over HTTP to itself and forward the received connection to an HTTP listener (ntlmrelayx) configured to relay to DC servers over LDAP/LDAPs for either setting shadow credentials or configuring RBCD.

#LDAP
#privesc
#relay
#webdav
#lpe
https://github.com/med0x2e/NTLMRelay2Self
@NetPentesters
RCE in BIG-IP iControl REST (CVE-2022-1388)

This vulnerability could allow an unauthenticated attacker with network access to a BIG-IP system to execute arbitrary system commands, create or delete files, or disable services (CVE-2022-1388)

Dork for Shodan:

http.noscript:"BIG-IP®-+Redirect" +"Server"

https://github.com/sherlocksecurity/CVE-2022-1388_F5_BIG-IP

#web
#cve
#rce
@NetPentesters
Tool to scan user data with neural networks

Octopii is an AI based user information scanner that uses Tesseract's Optical Character Recognition (OCR) and MobileNet's Convolutional Neural Network (CNN) model.

Allows you to detect various forms of government IDs, passports, debit cards, driver's licenses, photographs, signatures, etc.

https://github.com/redhuntlabs/Octopii

#redteam #leak
@NetPentesters
Maximizing BloodHound with a simple suite of tools

[Maximizing BloodHound with a simple suite of tools]
A set of console utilities for working with Bloodhound. Retrieve/update objects, mark objects as Owned/High Value Targets, delete objects, match shattered passwords (hashcat) with users, execute raw DB query...

https://github.com/knavesec/Max

#AD
#bloodhound
@NetPentesters
VLAN attacks toolkit

The author has nothing to do with those who will use this tool for personal purposes to destroy other people's computer networks. The tools are presented for training purposes to help engineers improve the security of their network.
https://github.com/necreas1ng/VLANPWN
#VLAN
@NetPentesters
​​Active-Directory-Purple-Teaming

This repository is aimed at sharing the cliff notes for performing Red Teaming of Active Directory System combined with Detection Engineering part of AD Attacks

https://github.com/MirHassanRiaz/Active-Directory-Purple-Teaming

#ad
@NetPentesters
Aced

Aced is a tool to parse and resolve a single targeted Active Directory principal's DACL. Aced will identify interesting inbound access allowed privileges against the targeted account, resolve the SIDS of the inbound permissions, and present that data to the operator.

Additionally, the logging features of pyldapsearch have been integrated with Aced to log the targeted principal's LDAP attributes locally which can then be parsed by pyldapsearch's companion tool BOFHound to ingest the collected data into BloodHound.

https://github.com/garrettfoster13/aced

#ad
#tools
@NetPentesters