KnownDllUnhook
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
https://github.com/ORCx41/KnownDllUnhook
#edr
@NetPentesters
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
https://github.com/ORCx41/KnownDllUnhook
#edr
@NetPentesters
GitHub
GitHub - NUL0x4C/KnownDllUnhook: Replace the .txt section of the current loaded modules from \KnownDlls\
Replace the .txt section of the current loaded modules from \KnownDlls\ - NUL0x4C/KnownDllUnhook
PowerHuntShares
PowerHuntShares is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.
It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation efforts at scale.
https://github.com/NetSPI/PowerHuntShares
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
#AD
#SMB
#BlueTeam
@NetPentesters
PowerHuntShares is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.
It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation efforts at scale.
https://github.com/NetSPI/PowerHuntShares
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
#AD
#SMB
#BlueTeam
@NetPentesters
GitHub
GitHub - NetSPI/PowerHuntShares: PowerHuntShares is an audit noscript designed in inventory, analyze, and report excessive privileges…
PowerHuntShares is an audit noscript designed in inventory, analyze, and report excessive privileges configured on Active Directory domains. - NetSPI/PowerHuntShares
Have a look at all the signed PowerShell noscripts located in C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\
Some of these can execute code and do all kind of interesting stuff.
https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts
#ps
#signed
#redteam
@NetPentesters
Some of these can execute code and do all kind of interesting stuff.
https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts
#ps
#signed
#redteam
@NetPentesters
AzureGoat
A Damn Vulnerable Azure Infrastructure.
AzureGoat is a vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as App Functions, CosmosDB, Storage Accounts, Automation and Identities. AzureGoat mimics real-world infrastructure but with added vulnerabilities. It features multiple escalation paths and is focused on a black-box approach.
The project will be divided into modules and each module will be a separate web application, powered by varied tech stacks and development practices. It will leverage IaC through terraform to ease the deployment process.
https://github.com/ine-labs/AzureGoat
#Azure
#AD
@NetPentesters
A Damn Vulnerable Azure Infrastructure.
AzureGoat is a vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as App Functions, CosmosDB, Storage Accounts, Automation and Identities. AzureGoat mimics real-world infrastructure but with added vulnerabilities. It features multiple escalation paths and is focused on a black-box approach.
The project will be divided into modules and each module will be a separate web application, powered by varied tech stacks and development practices. It will leverage IaC through terraform to ease the deployment process.
https://github.com/ine-labs/AzureGoat
#Azure
#AD
@NetPentesters
GitHub
GitHub - ine-labs/AzureGoat: AzureGoat : A Damn Vulnerable Azure Infrastructure
AzureGoat : A Damn Vulnerable Azure Infrastructure - ine-labs/AzureGoat
This tool is designed to parse Cisco device configuration files. The checklist is based on the Cisco Hardening Guide for Cisco IOS Devices.
https://github.com/frostbits-security/ccat
#Cisco
#checklist
@NetPentesters
https://github.com/frostbits-security/ccat
#Cisco
#checklist
@NetPentesters
GitHub
List of the checks
Cisco Config Analysis Tool. Contribute to cisco-config-analysis-tool/ccat development by creating an account on GitHub.
Pivoting Over Challenge Based Enterprise WiFi Network
https://tbhaxor.com/pivoting-over-peap-mschapv2-wifi-network
@NetPentesters
https://tbhaxor.com/pivoting-over-peap-mschapv2-wifi-network
@NetPentesters
tbhaxor's Blog
Pivoting Over Challenge Based Enterprise WiFi Network
You will discover how to connect to the organization's access point using PEAP-MSCHAPv2 authentication and relay the response to the authenticator challenge This will allow you to read the private emails on a LAN-hosted POP3 server.
🀄 Privilege Escalation Enumeration Script for Windows
https://github.com/itm4n/PrivescCheck
#windows
#privesc
#enumeration
#enum
#powershell
@NetPentesters
This noscript aims to enumerate common Windows security misconfigurations that can be leveraged for privilege escalation. It also gathers various information that might be useful for exploitation and/or post-exploitation
https://github.com/itm4n/PrivescCheck
#windows
#privesc
#enumeration
#enum
#powershell
@NetPentesters
GitHub
GitHub - itm4n/PrivescCheck: Privilege Escalation Enumeration Script for Windows
Privilege Escalation Enumeration Script for Windows - itm4n/PrivescCheck
Roast in the Middle
Python implementation of the man-in-the-middle attack
● Performs ARP spoofing between your target(s) and the gateway to obtain a man-in-the-middle position
● Sniffs traffic for an AS-REQ containing PA-ENC-TIMESTAMP data
● Replays the sniffed AS-REQ to a DC after changing the SPN to usernames/SPNs provided via a file
● Outputs any roasted account hashes
https://github.com/Tw1sm/RITM
#ad
#mitm
#kerberos
@NetPentesters
Python implementation of the man-in-the-middle attack
● Performs ARP spoofing between your target(s) and the gateway to obtain a man-in-the-middle position
● Sniffs traffic for an AS-REQ containing PA-ENC-TIMESTAMP data
● Replays the sniffed AS-REQ to a DC after changing the SPN to usernames/SPNs provided via a file
● Outputs any roasted account hashes
https://github.com/Tw1sm/RITM
#ad
#mitm
#kerberos
@NetPentesters
GitHub
GitHub - Tw1sm/RITM: Roast in the Middle
Roast in the Middle. Contribute to Tw1sm/RITM development by creating an account on GitHub.
[ Living-Off-the-Blindspot - Operating into EDRs’ blindspot ]
#edr
#bypass
#python
@NetPentesters
EDR bypass with python
https://www.naksyn.com/edr%20evasion/2022/09/01/operating-into-EDRs-blindspot.html#edr
#bypass
#python
@NetPentesters
BadBlood
BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.
After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
https://github.com/davidprowe/BadBlood
#ad
@NetPenteaters
BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.
After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
https://github.com/davidprowe/BadBlood
#ad
@NetPenteaters
I need an admin to train users
have the following conditions:
Have at least 1 year of network penetration testing experience or network penetration testing skills.
Training should be in Eve-NG or GNS3 environment.
Contact the following address:
@ChatNPTbot
have the following conditions:
Have at least 1 year of network penetration testing experience or network penetration testing skills.
Training should be in Eve-NG or GNS3 environment.
Contact the following address:
@ChatNPTbot
Azure AD Exporter
The Azure AD Exporter is a PowerShell module that allows you to export your Azure AD and Azure AD B2C configuration settings to local .json files.
This module can be run as a nightly scheduled task or a DevOps component (Azure DevOps, GitHub, Jenkins) and the exported files can be version controlled in Git or SharePoint.
This will provide tenant administrators with a historical view of all the settings in the tenant including the change history over the years.
https://github.com/microsoft/azureadexporter
#AD
#Azure
@NetPentesters
The Azure AD Exporter is a PowerShell module that allows you to export your Azure AD and Azure AD B2C configuration settings to local .json files.
This module can be run as a nightly scheduled task or a DevOps component (Azure DevOps, GitHub, Jenkins) and the exported files can be version controlled in Git or SharePoint.
This will provide tenant administrators with a historical view of all the settings in the tenant including the change history over the years.
https://github.com/microsoft/azureadexporter
#AD
#Azure
@NetPentesters
ShadowSpray
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.
https://github.com/Dec0ne/ShadowSpray/
#ad
#spray
@NetPentesters
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.
https://github.com/Dec0ne/ShadowSpray/
#ad
#spray
@NetPentesters
SpecterOps
The Renaissance of NTLM Relay Attacks: Everything You Need to Know - SpecterOps
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and arguably worse than ever before. Relay attacks are the easiest…
Microsoft Office Online Server Remote Code Execution
https://www.mdsec.co.uk/2022/10/microsoft-office-online-server-remote-code-execution/
#ssrf
#ntlm
@NetPentesters
https://www.mdsec.co.uk/2022/10/microsoft-office-online-server-remote-code-execution/
#ssrf
#ntlm
@NetPentesters
MDSec
Microsoft Office Online Server Remote Code Execution - MDSec
Microsoft’s Office Online Server is the next generation of Office Web Apps Server; it provides a browser based viewer/editor for Word, PowerPoint, Excel and OneNote documents. The product can be...
This media is not supported in your browser
VIEW IN TELEGRAM
QueenSono
A Golang Package for Data Exfiltration with ICMP protocol.
QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common.
It could also been used within a system with basic ICMP inspection (ie. frequency and content length watcher) or to bypass authentication step with captive portal (used by many public Wi-Fi to authenticate users after connecting to the Wi-Fi e.g Airport Wi-Fi).
Try to imitate PyExfil (and others) with the idea that the target machine does not necessary have python installed (so provide a binary could be useful)
https://github.com/ariary/QueenSono
@Netpentesters
A Golang Package for Data Exfiltration with ICMP protocol.
QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common.
It could also been used within a system with basic ICMP inspection (ie. frequency and content length watcher) or to bypass authentication step with captive portal (used by many public Wi-Fi to authenticate users after connecting to the Wi-Fi e.g Airport Wi-Fi).
Try to imitate PyExfil (and others) with the idea that the target machine does not necessary have python installed (so provide a binary could be useful)
https://github.com/ariary/QueenSono
@Netpentesters
PatchThatAMSI
6 AMSI patches , both force the triggering of a conditional jump inside AmsiOpenSession() that close the Amsi scanning session. The 1st patch by corrupting the Amsi context header and the 2nd patch by changing the string "AMSI" that will be compared to the Amsi context header to "D1RK". The other just
https://github.com/D1rkMtr/PatchThatAMSI
#amsi
#av
#bypass
@netpenteaters
6 AMSI patches , both force the triggering of a conditional jump inside AmsiOpenSession() that close the Amsi scanning session. The 1st patch by corrupting the Amsi context header and the 2nd patch by changing the string "AMSI" that will be compared to the Amsi context header to "D1RK". The other just
https://github.com/D1rkMtr/PatchThatAMSI
#amsi
#av
#bypass
@netpenteaters
Some useful Telegram channels
@OsintBlackBox
If you are interested in OSINT, the content here will be useful for you.
@Iranian_Osint
If you are interested in OSINT, the content here will be useful for you.
@PfkGit
If you are looking for penetration testing tools, find them here.
@pfk_git
If you are looking for penetration testing tools, find them here.
@Netpentesters ( English )
If you want to become a Pinterester, join this channel.
@Netpentester (Iranian)
If you want to become a Pinterester, join this channel.
@library_Sec
The largest cyber security library in Telegram.
@BlueRedTeam
Red Team and BlueTeam specialized reference.
@Pfk_0day
Learn Cyber Security ( Free )
@OsintBlackBox
If you are interested in OSINT, the content here will be useful for you.
@Iranian_Osint
If you are interested in OSINT, the content here will be useful for you.
@PfkGit
If you are looking for penetration testing tools, find them here.
@pfk_git
If you are looking for penetration testing tools, find them here.
@Netpentesters ( English )
If you want to become a Pinterester, join this channel.
@Netpentester (Iranian)
If you want to become a Pinterester, join this channel.
@library_Sec
The largest cyber security library in Telegram.
@BlueRedTeam
Red Team and BlueTeam specialized reference.
@Pfk_0day
Learn Cyber Security ( Free )
RustHound
https://github.com/OPENCYBER-FR/RustHound
#bloodhound
#ad
@NetPentesters
RustHound is a cross-platform BloodHound collector tool, written in Rust. (Linux,Windows,MacOS)
No anti-virus detection and cross-compiled.
RustHound generate users,groups,computers,ous,gpos,containers,domains json files to analyze it with BloodHound application.
If you can use SharpHound.exe, use it. Rusthound is a backup solution if SharpHound.exe is detected by AV or if SharpHound.exe isn't executable from the system where you have access to.
+ additional custom querieshttps://github.com/OPENCYBER-FR/RustHound
#bloodhound
#ad
@NetPentesters
#ad #ASREPRoast #kerberos
CVE-2022-33679 Windows Kerberos Elevation of Privilege
DOC
POC
@NetPentesters
CVE-2022-33679 Windows Kerberos Elevation of Privilege
DOC
POC
@NetPentesters