Network Penetration Testing – Telegram
Network Penetration Testing
1.03K subscribers
40 photos
3 videos
12 files
269 links
[ Network Penetration Testing & Cloud ]

Any misuse of this info will not be the responsibility of the author, educational purposes only.


@NetPentester
Download Telegram
[ Running Exploit As Protected Process Light From Userland ]
Run any code as the highest level of protection, meaning that the exploit will have full access over any other Protected Process Light and anti-malware services won’t be able to monitor it(Since they run with the lower protection of AntiMalware)

https://tastypepperoni.medium.com/running-exploit-as-protected-process-ligh-from-userland-f4c7dfe63387

+POC: https://github.com/tastypepperoni/RunAsWinTcb
#exploit
@NetPentesters
#sandbox #detect

Such a tiny code snippet that can help you bypass some automatic sandbox detections

@NetPentesters
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections
and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.

https://github.com/wavestone-cdt/EDRSandblast/tree/DefCon30Release
#edr
#bypass
@NetPentesters
PrintNightmare exploit With the following features:
- Ability to target multiple hosts.
- Built-in SMB server for payload delivery, removing the need for open file shares.
- Exploit includes both MS-RPRN & MS-PAR protocols (define in CMD args).
- Implements UNC bypass technique.

https://github.com/m8sec/CVE-2021-34527
@NetPentesters
​​dc-sonar

Analyzing AD domains for security risks related to user accounts

https://github.com/ST1LLY/dc-sonar

#ad
#redteam
@NetPentesters
​​RPCRecon

Tool in Bash to carry out a basic enumeration and extract the most relevant information from an Active Directory via rpcclient.

This utility will allow us to obtain the following information from a Domain:

▫️ Domain Users
▫️ Domain Users with their denoscription
▫️ Domain Admin Users
▫️ Domain Groups
▫️ Domains within the network

https://github.com/m4lal0/RPCrecon
#AD
@NetPentesters
​​SilentHound

Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.

This will create an isolated virtual environment with dependencies needed for the project. To use the project you can either open a shell in the virtualenv with pipenv shell or run commands directly with pipenv run.

https://github.com/layer8secure/SilentHound

#ad
@NetPentesters
​​AzurePolicyTestFramework

A CLI tool to test Azure Policy relying on Terraform + Golang

https://github.com/microsoft/AzurePolicyTestFramework
#Azure
@NetPentesters