😈 [ _wald0, Andy Robbins ]
I am proud to announce the release of #BloodHound 4.3!
Release blog post: https://t.co/9LESMBrimP
Limited edition T-shirt: https://t.co/V4PvatsuuQ
Get BloodHound 4.3 NOW at https://t.co/LOlhrNILYB
🔗 https://medium.com/p/5795cbf535b2
🔗 https://www.customink.com/fundraising/specterops-mdafr?pc=TXN-170516&utm_content=image&utm_source=fr_org_drafted_txn&utm_medium=email&utm_campaign=fr_org_saved_draft%252520%252528Ybrnqj%252529&_kx=QwWrrqFdZDAQYb89RSPMBmD81LpOl1n1CrorybjBR6s%25253D.SKGNUp&side=front&type=1&zoom=false
🔗 https://bit.ly/GetBloodHound
🐥 [ tweet ]
I am proud to announce the release of #BloodHound 4.3!
Release blog post: https://t.co/9LESMBrimP
Limited edition T-shirt: https://t.co/V4PvatsuuQ
Get BloodHound 4.3 NOW at https://t.co/LOlhrNILYB
🔗 https://medium.com/p/5795cbf535b2
🔗 https://www.customink.com/fundraising/specterops-mdafr?pc=TXN-170516&utm_content=image&utm_source=fr_org_drafted_txn&utm_medium=email&utm_campaign=fr_org_saved_draft%252520%252528Ybrnqj%252529&_kx=QwWrrqFdZDAQYb89RSPMBmD81LpOl1n1CrorybjBR6s%25253D.SKGNUp&side=front&type=1&zoom=false
🔗 https://bit.ly/GetBloodHound
🐥 [ tweet ]
😈 [ Synacktiv, Synacktiv ]
Beside LSASS, are you sure to loot every available secrets on your compromised Windows host? In our latest blogpost, @l4x4 summarizes the techniques and tools to ensure you do not miss any: https://t.co/Z81G732psQ
🔗 https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary
🐥 [ tweet ]
Beside LSASS, are you sure to loot every available secrets on your compromised Windows host? In our latest blogpost, @l4x4 summarizes the techniques and tools to ensure you do not miss any: https://t.co/Z81G732psQ
🔗 https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary
🐥 [ tweet ]
😈 [ M4yFly, Mayfly ]
Complete guide to deploy GOAD on Proxmox is ready 🥳
- part 1: Proxmox + pfsense
- part 2: template with packer
- part 3: providing with terraform
- part 4: provisioning with ansible
- part 5: add openvpn access
https://t.co/Rpawi6FFl8
=> https://t.co/hjbwXJqzsS
🔗 https://github.com/Orange-Cyberdefense/GOAD
🔗 https://mayfly277.github.io/categories/proxmox/
🐥 [ tweet ]
Complete guide to deploy GOAD on Proxmox is ready 🥳
- part 1: Proxmox + pfsense
- part 2: template with packer
- part 3: providing with terraform
- part 4: provisioning with ansible
- part 5: add openvpn access
https://t.co/Rpawi6FFl8
=> https://t.co/hjbwXJqzsS
🔗 https://github.com/Orange-Cyberdefense/GOAD
🔗 https://mayfly277.github.io/categories/proxmox/
🐥 [ tweet ]
😈 [ sensepost, Orange Cyberdefense's SensePost Team ]
"Attack of the clones", or, read how Reino suppressed snitchware on a "suspense"-full red team by abusing a suspended Bitlocker state: https://t.co/GDcs38Vcta
🔗 https://sensepost.com/blog/2023/from-bitlocker-suspended-to-virtual-machine/
🐥 [ tweet ]
"Attack of the clones", or, read how Reino suppressed snitchware on a "suspense"-full red team by abusing a suspended Bitlocker state: https://t.co/GDcs38Vcta
🔗 https://sensepost.com/blog/2023/from-bitlocker-suspended-to-virtual-machine/
🐥 [ tweet ]
интересное чтиво🔥1
😈 [ Tyl0us, Matt Eidelberg ]
ScareCrow 5.0 is out now, a massive rewrite of the framework with huge new features, IoC's removed & new evasion techniques added. If you are curious take a look at the changelog. Check it out: https://t.co/VIQVnKd2tJ #netsec #redteam #EDR #evasion
🔗 https://github.com/optiv/ScareCrow
🐥 [ tweet ]
ScareCrow 5.0 is out now, a massive rewrite of the framework with huge new features, IoC's removed & new evasion techniques added. If you are curious take a look at the changelog. Check it out: https://t.co/VIQVnKd2tJ #netsec #redteam #EDR #evasion
🔗 https://github.com/optiv/ScareCrow
🐥 [ tweet ]
😈 [ SEKTOR7net, SEKTOR7 Institute ]
RPC enters Beacon Object Files, by Christopher Paschen of @TrustedSec
#redteam
https://t.co/cCt5k1D2Ch
🔗 https://www.trustedsec.com/blog/using-rpc-in-bofs/
🐥 [ tweet ]
RPC enters Beacon Object Files, by Christopher Paschen of @TrustedSec
#redteam
https://t.co/cCt5k1D2Ch
🔗 https://www.trustedsec.com/blog/using-rpc-in-bofs/
🐥 [ tweet ]
🔥2
О дампе реестра с помощью SecretsDump и Co.
Долгое время я не знал, что, оказывается, secretsdump[.]py не только читает и расшифровывает ветки SAM и SECURITY прямиком из удаленного реестра, но также и экспортирует их на диск в файлы
В случаях, когда нужно спарсить LSA прямиком с Windows-хоста, я любил пользоваться SharpSecDump (который тоже сохраняет ветки на диск в файлы
После прочтения недавнего поста от @Synacktiv я узнал о крутой тулзе SharpSecretsdump, которая (по беглому просмотру) не дампает хивы в файлы и, соответственно, оставляет меньше IOC-ов от своего использования. Рекомендую обновить арсенал всем заинтересованным 😉
Долгое время я не знал, что, оказывается, secretsdump[.]py не только читает и расшифровывает ветки SAM и SECURITY прямиком из удаленного реестра, но также и экспортирует их на диск в файлы
%SYSTEMROOT%\Temp\*.tmp для извлечения отдельных значений, которые не получается достать "на горячую" (скриншот 1). Приостановив выполнение скрипта, их можно скачать и убедиться в этом самостоятельно (скриншот 2).В случаях, когда нужно спарсить LSA прямиком с Windows-хоста, я любил пользоваться SharpSecDump (который тоже сохраняет ветки на диск в файлы
%SYSTEMROOT%\*.log) с флагом -target=127.0.0.1, однако после того, как умные люди (@bugch3ck) заметили, что права доступа на экспортированные ветки позволяют низкопривилегированным пользакам их прочитать, стал относиться к ее использованию более аккуратно. Это происходит из-за наследования прав на создаваемые файлы в директории C:\Windows\ (скриншоты 3, 4).После прочтения недавнего поста от @Synacktiv я узнал о крутой тулзе SharpSecretsdump, которая (по беглому просмотру) не дампает хивы в файлы и, соответственно, оставляет меньше IOC-ов от своего использования. Рекомендую обновить арсенал всем заинтересованным 😉
🔥9
😈 [ lowercase_drm, drm ]
I created a PR that adds TLS Channel Binding compatibility to ldap3 library when used with NTLM authentication: https://t.co/sb3QB7sd1c
🔗 https://github.com/cannatag/ldap3/pull/1087
🐥 [ tweet ]
I created a PR that adds TLS Channel Binding compatibility to ldap3 library when used with NTLM authentication: https://t.co/sb3QB7sd1c
🔗 https://github.com/cannatag/ldap3/pull/1087
🐥 [ tweet ]
наконец-то, боже😈 [ M4yFly, Mayfly ]
Goad pwning part13, let's have fun with file coerce (lnk,url), webclient, impersonate and the old one rdphijack.
https://t.co/we7MA67sfX
🔗 https://mayfly277.github.io/posts/GOADv2-pwning-part13/
🐥 [ tweet ]
Goad pwning part13, let's have fun with file coerce (lnk,url), webclient, impersonate and the old one rdphijack.
https://t.co/we7MA67sfX
🔗 https://mayfly277.github.io/posts/GOADv2-pwning-part13/
🐥 [ tweet ]
😈 [ BoreanJordan, Jordan Borean ]
Just merged in some RPC/DCE changes to pyspnego https://t.co/lDdBqUetLa. I also created a new blob post around some of the details of RPC encryption used by Microsoft that will hopefully be useful for other people implementing their own client https://t.co/clj7oi6eAL
🔗 https://github.com/jborean93/pyspnego/pull/63
🔗 https://wp.me/p9gmIx-ax
🐥 [ tweet ]
Just merged in some RPC/DCE changes to pyspnego https://t.co/lDdBqUetLa. I also created a new blob post around some of the details of RPC encryption used by Microsoft that will hopefully be useful for other people implementing their own client https://t.co/clj7oi6eAL
🔗 https://github.com/jborean93/pyspnego/pull/63
🔗 https://wp.me/p9gmIx-ax
🐥 [ tweet ]
😈 [ 0gtweet, Grzegorz Tworek ]
A keylogger/sniffer for the on-screen-keyboard? Sure, ETW is happy to help here with {4F768BE8-9C69-4BBC-87FC-95291D3F9D0C}😁
Enjoy the C source code, and the compiled exe, as usual - https://t.co/FT73HaxM1c
🔗 https://github.com/gtworek/PSBits/tree/master/ETW
🐥 [ tweet ]
A keylogger/sniffer for the on-screen-keyboard? Sure, ETW is happy to help here with {4F768BE8-9C69-4BBC-87FC-95291D3F9D0C}😁
Enjoy the C source code, and the compiled exe, as usual - https://t.co/FT73HaxM1c
🔗 https://github.com/gtworek/PSBits/tree/master/ETW
🐥 [ tweet ]
🔥1
Forwarded from PT SWARM
Microsoft Exchange Powershell Remoting Deserialization leading to RCE (CVE-2023-21707)
👤 by testanull
While analyzing CVE-2022-41082, also known as Proxy Not Shell, researcher discovered CVE-2023-21707 vulnerability which he has detailed in this blog.
The vulnerability allows a privileged user to trigger RCE during a deserialization of untrusted data.
📝 Contents:
● Introduction
● The new variant
● Payload delivery
● Demo
● References
https://starlabs.sg/blog/2023/04-microsoft-exchange-powershell-remoting-deserialization-leading-to-rce-cve-2023-21707/
👤 by testanull
While analyzing CVE-2022-41082, also known as Proxy Not Shell, researcher discovered CVE-2023-21707 vulnerability which he has detailed in this blog.
The vulnerability allows a privileged user to trigger RCE during a deserialization of untrusted data.
📝 Contents:
● Introduction
● The new variant
● Payload delivery
● Demo
● References
https://starlabs.sg/blog/2023/04-microsoft-exchange-powershell-remoting-deserialization-leading-to-rce-cve-2023-21707/
😈 [ s4ntiago_p, S4ntiagoP ]
🔥 Big update!
Nanodump now supports the PPLMedic exploit!
meaning you can dump LSASS on an up-to-date system with PPL enabled 😃
https://t.co/Ki22xU5P4a
🔗 https://github.com/fortra/nanodump
🐥 [ tweet ]
🔥 Big update!
Nanodump now supports the PPLMedic exploit!
meaning you can dump LSASS on an up-to-date system with PPL enabled 😃
https://t.co/Ki22xU5P4a
🔗 https://github.com/fortra/nanodump
🐥 [ tweet ]
😈 [ rootsecdev, rootsecdev ]
Enjoyed this medium post. It has some excellent recommendations for studying Active Directory. Chisel stuff is spot on. 👇
“AD FOR OSCP (Active Directory Guide)” by Abhishekgk
https://t.co/QSWTosQvlI
🔗 https://link.medium.com/SSaz6xsdqzb
🐥 [ tweet ]
Enjoyed this medium post. It has some excellent recommendations for studying Active Directory. Chisel stuff is spot on. 👇
“AD FOR OSCP (Active Directory Guide)” by Abhishekgk
https://t.co/QSWTosQvlI
🔗 https://link.medium.com/SSaz6xsdqzb
🐥 [ tweet ]
🔥2
😈 [ mpgn_x64, mpgn ]
The sponsor version of CrackMapExec just receive an update from @MJHallenbeck 🚀
▶️ cme is now using rich logging from @willmcgugan
▶️ a progress bar has been added 🚄🚃🚃
▶️ protocol ssh is now working with a key
▶️ cmedb now store creds found with ssh
@porchetta_ind 🪂
🐥 [ tweet ]
The sponsor version of CrackMapExec just receive an update from @MJHallenbeck 🚀
▶️ cme is now using rich logging from @willmcgugan
▶️ a progress bar has been added 🚄🚃🚃
▶️ protocol ssh is now working with a key
▶️ cmedb now store creds found with ssh
@porchetta_ind 🪂
🐥 [ tweet ]
🔥5