MikroTik_vulns.pdf
555.4 KB
Most exploited vulnerabilities of MikroTik devices, 2021.
#Analytics
#Mikrotik
#vulnerability
@NetPentesters
#Analytics
#Mikrotik
#vulnerability
@NetPentesters
Microsoft and GitHub OAuth Implementation Vulnerabilities Lead to Redirection Attacks
https://www.proofpoint.com/us/blog/cloud-security/microsoft-and-github-oauth-implementation-vulnerabilities-lead-redirection
#microsoft
#vulnerability
@NetPentesters
https://www.proofpoint.com/us/blog/cloud-security/microsoft-and-github-oauth-implementation-vulnerabilities-lead-redirection
#microsoft
#vulnerability
@NetPentesters
CVE-2021-42287
Weaponisation - Active Directory
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
#AD
#cve
@NetPentesters
Weaponisation - Active Directory
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
#AD
#cve
@NetPentesters
Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)
https://github.com/ly4k/Pachine
#privilege
#CVE
#Python
#AD
@NetPentesters
https://github.com/ly4k/Pachine
#privilege
#CVE
#Python
#AD
@NetPentesters
Hypervisor compromises using Azure Run Command
https://www.mandiant.com/resources/azure-run-command-dummies
#Cloud
#Azure
@NetPentesters
https://www.mandiant.com/resources/azure-run-command-dummies
#Cloud
#Azure
@NetPentesters
Thirumalai_Khanna.pdf
3.6 MB
"Who Owns Your Hybrid Active Directory? Hunting for Adversary Techniques", 2021.
#cloud
#ad
@NetPentesters
#cloud
#ad
@NetPentesters
Active Directory Lateral Movement
https://research.splunk.com/stories/active_directory_lateral_movement
#Blue_Team
#AD
@NetPentesters
https://research.splunk.com/stories/active_directory_lateral_movement
#Blue_Team
#AD
@NetPentesters
Splunk Security Content
Analytics Story: Active Directory Lateral Movement
Date: 2021-12-09 ID: 399d65dc-1f08-499b-a259-aad9051f38ad Author: David Dorsey, Mauricio Velazco Splunk Product: Splunk Enterprise Security Denoscription Detect and investigate tactics, techniques, and procedures around how attackers move laterally within an…
Intruding 5G core networks from outside and inside
https://penthertz.com/blog/Intruding-5G-core-networks-from-outside-and_inside.html
#5G
#Network
@NetPentesters
https://penthertz.com/blog/Intruding-5G-core-networks-from-outside-and_inside.html
#5G
#Network
@NetPentesters
Powershell tool to automate Active Directory enumeration
https://github.com/61106960/adPEAS#simple-usage-with-generic-program-parameters
#PowerShell
#Redteam
#Ad
@NetPentesters
https://github.com/61106960/adPEAS#simple-usage-with-generic-program-parameters
#PowerShell
#Redteam
#Ad
@NetPentesters
GitHub
GitHub - 61106960/adPEAS: Powershell tool to automate Active Directory enumeration.
Powershell tool to automate Active Directory enumeration. - 61106960/adPEAS
Cloud Security Breaches and Vulnerabilities:
2021 in Review
https://blog.christophetd.fr/cloud-security-breaches-and-vulnerabilities-2021-in-review
#breaches
#cloud
#Vulnerability
@NetPentesters
2021 in Review
https://blog.christophetd.fr/cloud-security-breaches-and-vulnerabilities-2021-in-review
#breaches
#cloud
#Vulnerability
@NetPentesters
Internal network honeypot for detecting if an attacker/insider threat scans your network for log4j CVE-2021-44228
https://github.com/BinaryDefense/log4j-honeypot-flask
#honeypot
#Log4j
@NetPentesters
https://github.com/BinaryDefense/log4j-honeypot-flask
#honeypot
#Log4j
@NetPentesters
The mindmaps for AWS services
to get AWS Certificates easier
https://github.com/notcuder/aws-mindmap
#Mindmap
#Aws
@NetPentesters
to get AWS Certificates easier
https://github.com/notcuder/aws-mindmap
#Mindmap
#Aws
@NetPentesters
GitHub
GitHub - notcuder/aws-mindmap: The mindmaps for AWS services to get AWS Certificates easier.
The mindmaps for AWS services to get AWS Certificates easier. - notcuder/aws-mindmap
CrackMapExec (CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks
https://github.com/byt3bl33d3r/CrackMapExec
#AD
@NetPentesters
https://github.com/byt3bl33d3r/CrackMapExec
#AD
@NetPentesters
GitHub
GitHub - byt3bl33d3r/CrackMapExec: A swiss army knife for pentesting networks
A swiss army knife for pentesting networks. Contribute to byt3bl33d3r/CrackMapExec development by creating an account on GitHub.
CVE-2021-45608 - NetUSB RCE Flaw in Millions of End User Routers
https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers
#router
#cve
@NetPentesters
https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers
#router
#cve
@NetPentesters
SentinelOne
CVE-2021-45608 | NetUSB RCE Flaw in Millions of End User Routers
SentinelLabs has discovered a high severity flaw in NetUSB which could be remotely exploited to execute code in the kernel.
icmpdoor - ICMP reverse shell in Python 3
https://cryptsus.com/blog/icmp-reverse-shell.html
]-> https://github.com/krabelize/icmpdoor
#python
@NetPentesters
https://cryptsus.com/blog/icmp-reverse-shell.html
]-> https://github.com/krabelize/icmpdoor
#python
@NetPentesters
Cryptsus
icmpdoor - ICMP reverse shell in Python 3 — Cryptsus Blog
Cryptsus is a security consulting group of expert hackers specializing in securing systems and networks, authentication systems and vulnerability management.
Searching for Deserialization Protection Bypasses
in Microsoft Exchange (CVE-2022-21969)
https://medium.com/@frycos/searching-for-deserialization-protection-bypasses-in-microsoft-exchange-cve-2022-21969-bfa38f63a62d
#Microsoft
#exchange
@NetPentesters
in Microsoft Exchange (CVE-2022-21969)
https://medium.com/@frycos/searching-for-deserialization-protection-bypasses-in-microsoft-exchange-cve-2022-21969-bfa38f63a62d
#Microsoft
#exchange
@NetPentesters
Medium
Searching for Deserialization Protection Bypasses in Microsoft Exchange (CVE-2022–21969)
This story begins with a series of fails, but why? That is because of my special relationship with the Microsoft Exchange codebase…
SMBploit - offensive tool to scan/exploit vulnerabilities in Microsoft Windows over the Samba protocol (SMB) using the Metasploit Framework
https://github.com/d4t4s3c/SMBploit
@NetPentesters
https://github.com/d4t4s3c/SMBploit
@NetPentesters