Friends, if you have any questions about network penetration testing, contact us with the following bot:
@ChatNPTbot
@ChatNPTbot
Active Directory Certificate Services Abuse
https://rayrt.gitlab.io/posts/Active-Directory-Certificate-Services-Abuse/
#ad
#adcs
@NetPentesters
https://rayrt.gitlab.io/posts/Active-Directory-Certificate-Services-Abuse/
#ad
#adcs
@NetPentesters
Autobloody
Automatically exploit Active Directory privilege escalation paths shown by BloodHound combining pathgen.py and autobloody.py.
Here is the list of the BloodHound edges currently supported for automatic exploitation:
MemberOf
ForceChangePassword
AddMembers
AddSelf
DCSync
GetChanges/GetChangesAll
GenericAll
WriteDacl
GenericWrite
WriteOwner
Owns
Contains
AllExtendedRights
https://github.com/CravateRouge/autobloody
#ad
#bloodhound
@NetPentesters
Automatically exploit Active Directory privilege escalation paths shown by BloodHound combining pathgen.py and autobloody.py.
Here is the list of the BloodHound edges currently supported for automatic exploitation:
MemberOf
ForceChangePassword
AddMembers
AddSelf
DCSync
GetChanges/GetChangesAll
GenericAll
WriteDacl
GenericWrite
WriteOwner
Owns
Contains
AllExtendedRights
https://github.com/CravateRouge/autobloody
#ad
#bloodhound
@NetPentesters
GitHub
GitHub - CravateRouge/autobloody: Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound - CravateRouge/autobloody
[ LDAP Nom Nom ]
Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
https://github.com/lkarlslund/ldapnomnom
#ldap
#ad
#enum
#bruteforce
@NetPentesters
Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
https://github.com/lkarlslund/ldapnomnom
#ldap
#ad
#enum
#bruteforce
@NetPentesters
GitHub
GitHub - lkarlslund/ldapnomnom: Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers…
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP) - lkarlslund/ldapnomnom
PowerHuntShares
is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.
It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation efforts at scale.
https://github.com/NetSPI/PowerHuntShares
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
#ad
#SMB
@NetPentesters
is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.
It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation efforts at scale.
https://github.com/NetSPI/PowerHuntShares
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
#ad
#SMB
@NetPentesters
GitHub
GitHub - NetSPI/PowerHuntShares: PowerHuntShares is an audit noscript designed in inventory, analyze, and report excessive privileges…
PowerHuntShares is an audit noscript designed in inventory, analyze, and report excessive privileges configured on Active Directory domains. - NetSPI/PowerHuntShares
JuicyPotatoNG
Another Windows Local Privilege Escalation from Service Account to System
LINK TO RESEARCH
https://github.com/antonioCoco/JuicyPotatoNG
#windows #LPE
@NetPentesters
Another Windows Local Privilege Escalation from Service Account to System
LINK TO RESEARCH
https://github.com/antonioCoco/JuicyPotatoNG
#windows #LPE
@NetPentesters
Decoder's Blog
Giving JuicyPotato a second chance: JuicyPotatoNG
Well, it’s been a long time ago since our beloved JuicyPotato has been published. Meantime things changed and got fixed (backported also to Win10 1803/Server2016) leading to the glorious end …
linWinPwn
bash noscript that automates a number of Active Directory Enumeration and Vulnerability checks
https://github.com/lefayjey/linWinPwn
#ad
#enum
@NetPentesters
bash noscript that automates a number of Active Directory Enumeration and Vulnerability checks
https://github.com/lefayjey/linWinPwn
#ad
#enum
@NetPentesters
GitHub
GitHub - lefayjey/linWinPwn: linWinPwn is a bash noscript that streamlines the use of a number of Active Directory tools
linWinPwn is a bash noscript that streamlines the use of a number of Active Directory tools - lefayjey/linWinPwn
Azure Active Directory security operations guide for applications
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-applications
#Cloud
#Azure
@NetPentesters
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-applications
#Cloud
#Azure
@NetPentesters
Docs
Microsoft Entra security operations for applications - Microsoft Entra
Learn how to monitor and alert on applications to identify security threats.
+ Anonymously bruteforce AD usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
https://github.com/lkarlslund/ldapnomnom
+ Relaying YubiKeys
https://cube0x0.github.io/Relaying-YubiKeys
+ Stealing Access Tokens From Office Desktop Applications
https://mrd0x.com/stealing-tokens-from-office-applications
#Ad
#redteam
@NetPentesters
https://github.com/lkarlslund/ldapnomnom
+ Relaying YubiKeys
https://cube0x0.github.io/Relaying-YubiKeys
+ Stealing Access Tokens From Office Desktop Applications
https://mrd0x.com/stealing-tokens-from-office-applications
#Ad
#redteam
@NetPentesters
GitHub
GitHub - lkarlslund/ldapnomnom: Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers…
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP) - lkarlslund/ldapnomnom
Forwarded from Red Blue Team
#Red_Team
1. Kerberoast attack "pure python"
https://github.com/skelsec/kerberoast
2. A Guide to DNS Takeovers
https://blog.projectdiscovery.io/guide-to-dns-takeovers
3. Maquerade any legitimate Windows binary by changing some fields in the PEB structure
https://github.com/D1rkMtr/MasqueradingPEB
@BlueRedTeam
1. Kerberoast attack "pure python"
https://github.com/skelsec/kerberoast
2. A Guide to DNS Takeovers
https://blog.projectdiscovery.io/guide-to-dns-takeovers
3. Maquerade any legitimate Windows binary by changing some fields in the PEB structure
https://github.com/D1rkMtr/MasqueradingPEB
@BlueRedTeam
GitHub
GitHub - skelsec/kerberoast: Kerberoast attack -pure python-
Kerberoast attack -pure python-. Contribute to skelsec/kerberoast development by creating an account on GitHub.
ADDS_Tool
Active Directory Domain Services Tool.
Windows Command shell program that is a wrapper for ADDS toolset: - DSQUERY - DSGET - DSADD - DSMOD - DSMOVE
Features:
▫️ Main Menu
▫️ Settings Menu
▫️ Logs
▫️ Search Universal
▫️ Search User
▫️ Search Group
▫️ Search Computer
▫️ Search Server
▫️ Search OU
https://github.com/DavidGeeraerts/ADDS_Tool
#ad
#tools
@NetPentesters
Active Directory Domain Services Tool.
Windows Command shell program that is a wrapper for ADDS toolset: - DSQUERY - DSGET - DSADD - DSMOD - DSMOVE
Features:
▫️ Main Menu
▫️ Settings Menu
▫️ Logs
▫️ Search Universal
▫️ Search User
▫️ Search Group
▫️ Search Computer
▫️ Search Server
▫️ Search OU
https://github.com/DavidGeeraerts/ADDS_Tool
#ad
#tools
@NetPentesters
GitHub
GitHub - DavidGeeraerts/ADDS_Tool: ADDS (Active Directory Domain Services)
ADDS (Active Directory Domain Services). Contribute to DavidGeeraerts/ADDS_Tool development by creating an account on GitHub.
A new version of the popular #BloodHound tool has been released, including:
- 12 new and/or improved techniques, mostly for Azure
- Completely rewritten AzureHound on Go and more
https://posts.specterops.io/introducing-bloodhound-4-2-the-azure-refactor-1cff734938bd
#pentest
#cloud
#news
#tools
@NetPentesters
- 12 new and/or improved techniques, mostly for Azure
- Completely rewritten AzureHound on Go and more
https://posts.specterops.io/introducing-bloodhound-4-2-the-azure-refactor-1cff734938bd
#pentest
#cloud
#news
#tools
@NetPentesters
Medium
Introducing BloodHound 4.2 — The Azure Refactor
The BloodHound Enterprise team is proud to announce the release of BloodHound 4.2 — The Azure Refactor.
Systematization of attacks on the perimeter of L2/L3 network equipment. Ver. 2.0.
#attack
#Analytics
@NetPentesters
#attack
#Analytics
@NetPentesters
Network Relaying Abuse in a Windows Domain
https://labs.nettitude.com/blog/network-relaying-abuse-windows-domain/
https://labs.nettitude.com/blog/network-relaying-abuse-windows-domain/
LRQA
Network Relaying Abuse in a Windows Domain
Network relaying abuse in the context of a legacy Windows authentication protocol is by no means a novel vector for privilege escalation in a domain context.
LDAP Monitor
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
With this tool you can quickly see if your attack worked and if it changed LDAP attributes of the target object
https://github.com/p0dalirius/LDAPmonitor
#ldap
@NetPentesters
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
With this tool you can quickly see if your attack worked and if it changed LDAP attributes of the target object
https://github.com/p0dalirius/LDAPmonitor
#ldap
@NetPentesters
KnownDllUnhook
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
https://github.com/ORCx41/KnownDllUnhook
#edr
@NetPentesters
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
https://github.com/ORCx41/KnownDllUnhook
#edr
@NetPentesters
GitHub
GitHub - NUL0x4C/KnownDllUnhook: Replace the .txt section of the current loaded modules from \KnownDlls\
Replace the .txt section of the current loaded modules from \KnownDlls\ - NUL0x4C/KnownDllUnhook
PowerHuntShares
PowerHuntShares is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.
It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation efforts at scale.
https://github.com/NetSPI/PowerHuntShares
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
#AD
#SMB
#BlueTeam
@NetPentesters
PowerHuntShares is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.
It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation efforts at scale.
https://github.com/NetSPI/PowerHuntShares
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
#AD
#SMB
#BlueTeam
@NetPentesters
GitHub
GitHub - NetSPI/PowerHuntShares: PowerHuntShares is an audit noscript designed in inventory, analyze, and report excessive privileges…
PowerHuntShares is an audit noscript designed in inventory, analyze, and report excessive privileges configured on Active Directory domains. - NetSPI/PowerHuntShares
Have a look at all the signed PowerShell noscripts located in C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\
Some of these can execute code and do all kind of interesting stuff.
https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts
#ps
#signed
#redteam
@NetPentesters
Some of these can execute code and do all kind of interesting stuff.
https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts
#ps
#signed
#redteam
@NetPentesters
AzureGoat
A Damn Vulnerable Azure Infrastructure.
AzureGoat is a vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as App Functions, CosmosDB, Storage Accounts, Automation and Identities. AzureGoat mimics real-world infrastructure but with added vulnerabilities. It features multiple escalation paths and is focused on a black-box approach.
The project will be divided into modules and each module will be a separate web application, powered by varied tech stacks and development practices. It will leverage IaC through terraform to ease the deployment process.
https://github.com/ine-labs/AzureGoat
#Azure
#AD
@NetPentesters
A Damn Vulnerable Azure Infrastructure.
AzureGoat is a vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as App Functions, CosmosDB, Storage Accounts, Automation and Identities. AzureGoat mimics real-world infrastructure but with added vulnerabilities. It features multiple escalation paths and is focused on a black-box approach.
The project will be divided into modules and each module will be a separate web application, powered by varied tech stacks and development practices. It will leverage IaC through terraform to ease the deployment process.
https://github.com/ine-labs/AzureGoat
#Azure
#AD
@NetPentesters
GitHub
GitHub - ine-labs/AzureGoat: AzureGoat : A Damn Vulnerable Azure Infrastructure
AzureGoat : A Damn Vulnerable Azure Infrastructure - ine-labs/AzureGoat
This tool is designed to parse Cisco device configuration files. The checklist is based on the Cisco Hardening Guide for Cisco IOS Devices.
https://github.com/frostbits-security/ccat
#Cisco
#checklist
@NetPentesters
https://github.com/frostbits-security/ccat
#Cisco
#checklist
@NetPentesters
GitHub
List of the checks
Cisco Config Analysis Tool. Contribute to cisco-config-analysis-tool/ccat development by creating an account on GitHub.