😈 [ @thunderysteak@mastodon.social @ThunderySteak ]
totally forgot that naming your wifi after mimikatz noscript makes windows eat itself
🐥 [ tweet ]
totally forgot that naming your wifi after mimikatz noscript makes windows eat itself
🐥 [ tweet ]
😁26👍1🔥1😢1
😈 [ Andrew Oliveau @AndrewOliveau ]
👀👀🫵💥 "SeeSeeYouExec: Windows Session Hijacking via CcmExec"
New @Mandiant Red Team blog explores how SCCM's CcmExec service can be utilized for session hijacking and introduces a new tool, CcmPwn, to weaponize this technique! Defense tips included 🔵
🔗 https://cloud.google.com/blog/topics/threat-intelligence/windows-session-hijacking-via-ccmexec
🐥 [ tweet ]
👀👀🫵💥 "SeeSeeYouExec: Windows Session Hijacking via CcmExec"
New @Mandiant Red Team blog explores how SCCM's CcmExec service can be utilized for session hijacking and introduces a new tool, CcmPwn, to weaponize this technique! Defense tips included 🔵
🔗 https://cloud.google.com/blog/topics/threat-intelligence/windows-session-hijacking-via-ccmexec
🐥 [ tweet ]
👍2🔥2
Forwarded from 1N73LL1G3NC3
Пост-эксплуатация Windows с использованием виртуальных VPN-каналов / Обход NAT при пивотинге против Windows
NAT может создать проблемы для пентестера, когда он проводит пивотинг, особенно если мы говорим о скромпрометированных машинах на Windows. В этой статье я продолжу демонстрировать концепцию L2-туннелирования против скомпрометированных машин на Windows, но уже учитывая наличие NAT.
https://teletype.in/@casterbyte/witchhammer
https://teletype.in/@casterbyte/witchhammervip
Thx @casterwire
NAT может создать проблемы для пентестера, когда он проводит пивотинг, особенно если мы говорим о скромпрометированных машинах на Windows. В этой статье я продолжу демонстрировать концепцию L2-туннелирования против скомпрометированных машин на Windows, но уже учитывая наличие NAT.
https://teletype.in/@casterbyte/witchhammer
https://teletype.in/@casterbyte/witchhammervip
Thx @casterwire
🔥8🥱6🤯3👍2😁1
😈 [ Kali Linux @kalilinux ]
The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today:
🔗 https://www.helpnetsecurity.com/2024/03/29/cve-2024-3094-linux-backdoor/
🔗 https://www.openwall.com/lists/oss-security/2024/03/29/4
🔗 https://threadreaderapp.com/thread/1773786266074513523.html
🔗 https://tukaani.org/xz-backdoor/
🐥 [ tweet ]
⚠️ UPDATE ASAP ⚠️
The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today:
sudo apt update && sudo apt install --only-upgrade liblzma5
🔗 https://www.helpnetsecurity.com/2024/03/29/cve-2024-3094-linux-backdoor/
🔗 https://www.openwall.com/lists/oss-security/2024/03/29/4
🔗 https://threadreaderapp.com/thread/1773786266074513523.html
🔗 https://tukaani.org/xz-backdoor/
🐥 [ tweet ]
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥11👍6😁3
😈 [ Matt Creel @Tw1sm ]
Been working to improve my BOF/C dev skills, created some BOFs mimicking SQLRecon modules as a fun learning exercise
🔗 https://github.com/Tw1sm/SQL-BOF
🐥 [ tweet ]
Been working to improve my BOF/C dev skills, created some BOFs mimicking SQLRecon modules as a fun learning exercise
🔗 https://github.com/Tw1sm/SQL-BOF
🐥 [ tweet ]
👍4
😈 [ 0xdf @0xdf_ ]
I learned so much about Kerberos solving Rebound. It was very difficult, but such a great experience. There's Kerberoasting without auth, cross session with RemotePotato0, and abusing delegation, both constrained and RBCD!
🔗 https://0xdf.gitlab.io/2024/03/30/htb-rebound.html
🔗 https://youtu.be/oUIoH4yBT3k?si=EvookdfPJ6wMaCZK
🐥 [ tweet ]
I learned so much about Kerberos solving Rebound. It was very difficult, but such a great experience. There's Kerberoasting without auth, cross session with RemotePotato0, and abusing delegation, both constrained and RBCD!
🔗 https://0xdf.gitlab.io/2024/03/30/htb-rebound.html
🔗 https://youtu.be/oUIoH4yBT3k?si=EvookdfPJ6wMaCZK
🐥 [ tweet ]
миллион лет уже не был на хтб, но райтап прикольный, где-то выглядит даже жизненно для АДшечки🔥8👍1
😈 [ Lsec @lsecqt ]
My blogpost about bypassing AVs via SMB staging is now LIVE:
🔗 https://lsecqt.github.io/Red-Teaming-Army/malware-development/beyond-detection-smb-staging-for-antivirus-evasion/
Let me know if you enjoy such content and if you would want to see more of that in future.
🐥 [ tweet ]
#для_самых_маленьких
My blogpost about bypassing AVs via SMB staging is now LIVE:
🔗 https://lsecqt.github.io/Red-Teaming-Army/malware-development/beyond-detection-smb-staging-for-antivirus-evasion/
Let me know if you enjoy such content and if you would want to see more of that in future.
🐥 [ tweet ]
#для_самых_маленьких
🔥6👍5
Offensive Xwitter
😈 [ Kali Linux @kalilinux ] The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th…
Схема работы бэкдора, составленная специалистом Microsoft Томасом Рочча (Thomas Roccia)
🔥5🤯3👍1
😈 [ Octoberfest7 @Octoberfest73 ]
This April Fools Day, I'm excited to release my latest research and blog post from my time at @RedSiege: SSHishing. The name might be a joke, but the technique isn't!
Read the details here:
🔗 https://redsiege.com/sshishing
🐥 [ tweet ]
This April Fools Day, I'm excited to release my latest research and blog post from my time at @RedSiege: SSHishing. The name might be a joke, but the technique isn't!
Read the details here:
🔗 https://redsiege.com/sshishing
🐥 [ tweet ]
🤔2
😈 [ Cipher007 @xCipher007 ]
It's my first payload Loader with my learnings from @MalDevAcademy ! Check it out:
🔗 https://github.com/Cipher7/ChaiLdr
🐥 [ tweet ]
It's my first payload Loader with my learnings from @MalDevAcademy ! Check it out:
🔗 https://github.com/Cipher7/ChaiLdr
🐥 [ tweet ]
👍4
😈 [ Alex Plaskett @alexjplaskett ]
A blog on reversing Dark Souls 3 networking by Tim Leonard:
Connection:
🔗 https://timleonard.uk/2022/05/29/reverse-engineering-dark-souls-3-networking
Packets:
🔗 https://timleonard.uk/2022/06/02/reverse-engineering-dark-souls-3-networking-part-2
Key Exchange:
🔗 https://timleonard.uk/2022/06/03/reverse-engineering-dark-souls-3-networking-part-3
Reliable UDP:
🔗 https://timleonard.uk/2022/06/09/reverse-engineering-dark-souls-3-networking-part-4
More:
🔗 https://timleonard.uk/2022/06/18/reverse-engineering-dark-souls-3-networking-part-5
🔗 https://timleonard.uk/2022/06/18/reverse-engineering-dark-souls-3-networking-part-6
🔗 https://timleonard.uk/2022/06/20/reverse-engineering-dark-souls-3-networking-part-7
🐥 [ tweet ]
A blog on reversing Dark Souls 3 networking by Tim Leonard:
Connection:
🔗 https://timleonard.uk/2022/05/29/reverse-engineering-dark-souls-3-networking
Packets:
🔗 https://timleonard.uk/2022/06/02/reverse-engineering-dark-souls-3-networking-part-2
Key Exchange:
🔗 https://timleonard.uk/2022/06/03/reverse-engineering-dark-souls-3-networking-part-3
Reliable UDP:
🔗 https://timleonard.uk/2022/06/09/reverse-engineering-dark-souls-3-networking-part-4
More:
🔗 https://timleonard.uk/2022/06/18/reverse-engineering-dark-souls-3-networking-part-5
🔗 https://timleonard.uk/2022/06/18/reverse-engineering-dark-souls-3-networking-part-6
🔗 https://timleonard.uk/2022/06/20/reverse-engineering-dark-souls-3-networking-part-7
🐥 [ tweet ]
🔥5👍3
😈 [ taha @lordx64 ]
Imagine you are the threat actor behind xz backdoor and you have to explain to your boss why did you spent 6+months building something this complex that a single dude, reversed, documented exploited repurposed honeypoted dockerized in 24hours. This is a W
🔗 https://github.com/amlweems/xzbot
🐥 [ tweet ]
Imagine you are the threat actor behind xz backdoor and you have to explain to your boss why did you spent 6+months building something this complex that a single dude, reversed, documented exploited repurposed honeypoted dockerized in 24hours. This is a W
🔗 https://github.com/amlweems/xzbot
🐥 [ tweet ]
😁12🥱3😢2👍1🔥1
😈 [ Mayfly @M4yFly ]
SCCM Lab write up 📝part 0x3 is out:
🔗 https://mayfly277.github.io/posts/SCCM-LAB-part0x3/
- Exploit as client admin
- Exploit as sccm admin
Find all the articles about the SCCM laboratory exploitation here:
🔗 https://mayfly277.github.io/categories/sccm/
🐥 [ tweet ]
SCCM Lab write up 📝part 0x3 is out:
🔗 https://mayfly277.github.io/posts/SCCM-LAB-part0x3/
- Exploit as client admin
- Exploit as sccm admin
Find all the articles about the SCCM laboratory exploitation here:
🔗 https://mayfly277.github.io/categories/sccm/
🐥 [ tweet ]
👍6
Forwarded from Just Security
Media is too big
VIEW IN TELEGRAM
Судя по всему, статуэтка победителя #pentestaward не только радует глаз, но и пригождается в хозяйстве у наших призеров. Если хотите также, не пропустите анонс нового сезона премии для этичных хакеров!
Уже скоро опубликуем подробности😉
* обязательно со звуком
Уже скоро опубликуем подробности
* обязательно со звуком
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5👍3🥱3
😈 [ Mark Baggett @MarkBaggett ]
Kerberoasting was discovered more than 8 years ago. But it’s still effective today. Do you know how it works and how it was discovered? Check out @TimMedin of @RedSiege in this episode.
🔗 https://youtu.be/KHkYd81wHTg?si=Hy_sJN_YjQqSnL6J
🐥 [ tweet ]
Kerberoasting was discovered more than 8 years ago. But it’s still effective today. Do you know how it works and how it was discovered? Check out @TimMedin of @RedSiege in this episode.
🔗 https://youtu.be/KHkYd81wHTg?si=Hy_sJN_YjQqSnL6J
🐥 [ tweet ]
🔥4🤯3👍1
😈 [ Mark Baggett @MarkBaggett ]
Do you know the history of Metasploit? How did it grow from a small project to a game changer for Infosec? Check out this episode of Infosec. Toolshed featuring @hdmoore
🔗 https://youtu.be/Dl6qNRCiPgo?si=-zKticbSGYqlL6H7
🐥 [ tweet ]
Do you know the history of Metasploit? How did it grow from a small project to a game changer for Infosec? Check out this episode of Infosec. Toolshed featuring @hdmoore
🔗 https://youtu.be/Dl6qNRCiPgo?si=-zKticbSGYqlL6H7
🐥 [ tweet ]
👍4
😈 [ Ido Veltzman @Idov31 ]
After a long time, the 6th and final part of Lord Of The Ring0 is here:
In this part, the focus will be on kernel mode and user mode memory interaction, look into how attaching process work, and writing an AMSI bypass driver:
🔗 https://idov31.github.io/posts/lord-of-the-ring0-p6
🐥 [ tweet ]
After a long time, the 6th and final part of Lord Of The Ring0 is here:
In this part, the focus will be on kernel mode and user mode memory interaction, look into how attaching process work, and writing an AMSI bypass driver:
🔗 https://idov31.github.io/posts/lord-of-the-ring0-p6
🐥 [ tweet ]
🔥5