These KQL queries are designed to find use of the abuses in the #BloodHound BARK toolkit in #Azure AD
https://github.com/reprise99/Sentinel-Queries/tree/main/Azure%20AD%20Abuse%20Detection
#ad
@NetPentesters
https://github.com/reprise99/Sentinel-Queries/tree/main/Azure%20AD%20Abuse%20Detection
#ad
@NetPentesters
GitHub
Sentinel-Queries/Azure AD Abuse Detection at main · reprise99/Sentinel-Queries
Collection of KQL queries. Contribute to reprise99/Sentinel-Queries development by creating an account on GitHub.
FarsightAD
A #PowerShell noscript that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise.
The noscript produces CSV / JSON file exports of various objects and their attributes, enriched with timestamps from replication metadata. Additionally, if executed with replication privileges, the Directory Replication Service (DRS) protocol is leveraged to detect fully or partially hidden objects.
https://github.com/Qazeer/FarsightAD
#ad
@NetPentesters
A #PowerShell noscript that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise.
The noscript produces CSV / JSON file exports of various objects and their attributes, enriched with timestamps from replication metadata. Additionally, if executed with replication privileges, the Directory Replication Service (DRS) protocol is leveraged to detect fully or partially hidden objects.
https://github.com/Qazeer/FarsightAD
#ad
@NetPentesters
GitHub
GitHub - Qazeer/FarsightAD: PowerShell noscript that aim to help uncovering (eventual) persistence mechanisms deployed by a threat…
PowerShell noscript that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise - Qazeer/FarsightAD
👨💻1
ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files.
ntlm_theft is an Open Source Python3 Tool that generates 21 different types of hash theft documents. These can be used for phishing when either the target allows smb traffic outside their network, or if you are already inside the internal network.
https://github.com/Greenwolf/ntlm_theft
#NTML
@Netpentesters
A tool for generating multiple types of NTLMv2 hash theft files.
ntlm_theft is an Open Source Python3 Tool that generates 21 different types of hash theft documents. These can be used for phishing when either the target allows smb traffic outside their network, or if you are already inside the internal network.
https://github.com/Greenwolf/ntlm_theft
#NTML
@Netpentesters
Sandman
Sandman is a backdoor that meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (protocol to sync time & date) to download an arbitrary shellcode from a pre defined server.
Since NTP is a protocol that is overlooked by many defenders resulting wide network accessability.
https://github.com/Idov31/Sandman
#redteam
@Netpentesters
Sandman is a backdoor that meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (protocol to sync time & date) to download an arbitrary shellcode from a pre defined server.
Since NTP is a protocol that is overlooked by many defenders resulting wide network accessability.
https://github.com/Idov31/Sandman
#redteam
@Netpentesters
GitHub
GitHub - Idov31/Sandman: Sandman is a NTP based backdoor for hardened networks.
Sandman is a NTP based backdoor for hardened networks. - Idov31/Sandman
Warbird Hook
Using Microsoft WARBIRD to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard.
https://github.com/KiFilterFiberContext/warbird-hook
@Netpentesters
Using Microsoft WARBIRD to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard.
https://github.com/KiFilterFiberContext/warbird-hook
@Netpentesters
GitHub
GitHub - KiFilterFiberContext/warbird-hook: Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in…
Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard - KiFilterFiberContext/warbird-hook
👍1
⭐️ Privileger
Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:
— Add privileges to an account;
— Start a process by adding a specific privilege to its token;
— Remove privilege from the user.
Thanks to:
@Michaelzhm
https://github.com/MzHmO/Privileger
#ad #windows #privilege #lsa
@netpentesters
Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:
— Add privileges to an account;
— Start a process by adding a specific privilege to its token;
— Remove privilege from the user.
Thanks to:
@Michaelzhm
https://github.com/MzHmO/Privileger
#ad #windows #privilege #lsa
@netpentesters
👍4
Friends, if you have an idea to improve the channel, share it with us.
@ChatNPTbot
@ChatNPTbot
Clouditor Community Edition
Clouditor is a tool which supports continuous cloud assurance. Its main goal is to continuously evaluate if a cloud-based application (built using, e.g., Amazon Web Services (AWS) or Microsoft Azure) is configured in a secure way and thus complies with security requirements defined by, e.g., Cloud Computing Compliance Controls Catalogue (C5) issued by the German Office for Information Security (BSI) or the Cloud Control Matrix (CCM) published by the Cloud Security Alliance (CSA).
https://github.com/clouditor/clouditor
#azure #aws
@netpentesters
Clouditor is a tool which supports continuous cloud assurance. Its main goal is to continuously evaluate if a cloud-based application (built using, e.g., Amazon Web Services (AWS) or Microsoft Azure) is configured in a secure way and thus complies with security requirements defined by, e.g., Cloud Computing Compliance Controls Catalogue (C5) issued by the German Office for Information Security (BSI) or the Cloud Control Matrix (CCM) published by the Cloud Security Alliance (CSA).
https://github.com/clouditor/clouditor
#azure #aws
@netpentesters
Masky
A python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX, NT hashes and TGT on a larger scope.
This tool does not exploit any new vulnerability and does not work by dumping the LSASS process memory. Indeed, it only takes advantage of legitimate Windows and Active Directory features (token impersonation, certificate authentication via kerberos & NT hashes retrieval via PKINIT).
A blog post was published to detail the implemented technics and how Masky works.
https://github.com/Z4kSec/Masky
#ad #adcs #lsass #redteam
@Netpentesters
A python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX, NT hashes and TGT on a larger scope.
This tool does not exploit any new vulnerability and does not work by dumping the LSASS process memory. Indeed, it only takes advantage of legitimate Windows and Active Directory features (token impersonation, certificate authentication via kerberos & NT hashes retrieval via PKINIT).
A blog post was published to detail the implemented technics and how Masky works.
https://github.com/Z4kSec/Masky
#ad #adcs #lsass #redteam
@Netpentesters
GitHub
GitHub - Z4kSec/Masky: Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the…
Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory - Z4kSec/Masky
extracting NTLMv2 hashes from a network traffic dump
https://github.com/mlgualtieri/NTLMRawUnHide
#ntlm #pcap
@Netpentesters
https://github.com/mlgualtieri/NTLMRawUnHide
#ntlm #pcap
@Netpentesters
GitHub
GitHub - mlgualtieri/NTLMRawUnHide: NTLMRawUnhide.py is a Python3 noscript designed to parse network packet capture files and extract…
NTLMRawUnhide.py is a Python3 noscript designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supporte...
Systematization of attacks on the perimeter of L2/L3 network equipment. Ver. 3.0.
V 2.0
#Analytics
#attack
@netpentesters
V 2.0
#Analytics
#attack
@netpentesters
How To Identify A Company’s Domains With Azure AD
https://nixintel.info/osint-tools/how-to-identify-a-companys-domains-with-azure-ad/
#OSINT
@NetPentesters
https://nixintel.info/osint-tools/how-to-identify-a-companys-domains-with-azure-ad/
#OSINT
@NetPentesters
🔥3
This media is not supported in your browser
VIEW IN TELEGRAM
Exchange TabShell RCE PoC (CVE-2022-41076)
+ Microsoft #Exchange: OWASSRF + TabShell (CVE-2022-41076)
The TabShell vulnerability its a form of #Privilege Escalation which allows breaking out of the restricted #Powershell #Sandbox after you have successfully gained access through OWASSRF.
https://gist.github.com/testanull/518871a2e2057caa2bc9c6ae6634103e
Details:
https://blog.viettelcybersecurity.com/tabshell-owassrf/
#Exchange
#ssrf
#tabshell
#poc
@NetPentesters
+ Microsoft #Exchange: OWASSRF + TabShell (CVE-2022-41076)
The TabShell vulnerability its a form of #Privilege Escalation which allows breaking out of the restricted #Powershell #Sandbox after you have successfully gained access through OWASSRF.
https://gist.github.com/testanull/518871a2e2057caa2bc9c6ae6634103e
Details:
https://blog.viettelcybersecurity.com/tabshell-owassrf/
#Exchange
#ssrf
#tabshell
#poc
@NetPentesters
WP_Timeroasting_v3.pdf
1.5 MB
#Whitepaper
"Timeroasting, Trustroasting and Computer Spraying: Taking advantage of weak computer and trust account passwords in Active Directory".
]-> Timeroasting noscripts:
https://github.com/SecuraBV/Timeroast
#AD
@NetPentesters
"Timeroasting, Trustroasting and Computer Spraying: Taking advantage of weak computer and trust account passwords in Active Directory".
]-> Timeroasting noscripts:
https://github.com/SecuraBV/Timeroast
#AD
@NetPentesters
[CVE49] Microsoft Windows LNK Remote Code Execution Vulnerability - CVE-2020-1299
File Explorer, previously known as Windows Explorer, is a file manager application that has been included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems. It is also the component of the operating system that presents many user interface items on the screen such as the taskbar and desktop.
Explorer has a lot of features, each version of the operating system has been upgraded it by Microsoft. Here I discovered that the Explorer will automatically parsing the LNK file if the LNK file appears in the context that the Explorer is accessing. For example, if we are on the desktop, the Explorer will parse the LNK files that appear on the desktop and maybe in some secondary directory (about the depth of the folder that the Explorer can access, I don't know).
https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html?m=1
@NetPentesters
File Explorer, previously known as Windows Explorer, is a file manager application that has been included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems. It is also the component of the operating system that presents many user interface items on the screen such as the taskbar and desktop.
Explorer has a lot of features, each version of the operating system has been upgraded it by Microsoft. Here I discovered that the Explorer will automatically parsing the LNK file if the LNK file appears in the context that the Explorer is accessing. For example, if we are on the desktop, the Explorer will parse the LNK files that appear on the desktop and maybe in some secondary directory (about the depth of the folder that the Explorer can access, I don't know).
https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html?m=1
@NetPentesters
👍1
pfSense as an OpenVPN client for specific devices
One of the most powerful features of pfSense is it’s ability to direct your data requests through different end-points using NAT rules. pfSense is amazing as an OpenVPN client because it can selectively route any device on the network through the VPN service (i.e., my tablets and TV go through US servers, while my smartphone, VoIP, computers go my local ISP).
This setup becomes extremely handy for use with applications which are not aware of OpenVPN protocol, eg. download managers, torrent clients, etc. Expecting privacy you should be positive that traffic won't go through your ISP's gateway in case of failure on side of VPN provider. And obviously OpenVPN client should automatically reconnect as soon as service goes live again.
https://gist.github.com/InQuize/59e7c458c510ae779743
#Pfsense
@Netpentesters
One of the most powerful features of pfSense is it’s ability to direct your data requests through different end-points using NAT rules. pfSense is amazing as an OpenVPN client because it can selectively route any device on the network through the VPN service (i.e., my tablets and TV go through US servers, while my smartphone, VoIP, computers go my local ISP).
This setup becomes extremely handy for use with applications which are not aware of OpenVPN protocol, eg. download managers, torrent clients, etc. Expecting privacy you should be positive that traffic won't go through your ISP's gateway in case of failure on side of VPN provider. And obviously OpenVPN client should automatically reconnect as soon as service goes live again.
https://gist.github.com/InQuize/59e7c458c510ae779743
#Pfsense
@Netpentesters
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
https://github.com/lgandx/PCredz
#pcap
#credential
#sniffer
@Netpentesters
https://github.com/lgandx/PCredz
#pcap
#credential
#sniffer
@Netpentesters
GitHub
GitHub - lgandx/PCredz: This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth…
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interfa...
🔥2