Forwarded from @Phantasm_Lab
The Hacker Playbook 2 - Practical Guide To Penetration Testing
https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
| PDF/EPUB/MOBI | 23/18/53 MB |https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker PlayBook 3 - Pratical Guide To Penetration Testing
🕴🏽 @Phantasm_Lab
This is the third iteration of The Hacker Playbook (THP) series. Below is an overview of all the new vulnerabilities and attacks that will be discussed. In addition to the new content, some attacks and techniques from the prior books (which are still relevant today) are included to eliminate the need to refer back to the prior books. So, what's new? Some of the updated topics from the past couple of years include:- Abusing Active Directory- Abusing Kerberos- Advanced Web Attacks- Better Ways to Move Laterally- Cloud Vulnerabilities- Faster/Smarter Password Cracking- Living Off the Land- Lateral Movement Attacks- Multiple Custom Labs- Newer Web Language Vulnerabilities- Physical Attacks- Privilege Escalation- PowerShell Attacks- Ransomware Attacks- Red Team vs Penetration Testing- Setting Up Your Red Team Infrastructure- Usable Red Team Metrics- Writing Malware and Evading AV- And so much more🕴🏽 @Phantasm_Lab
Forwarded from @Phantasm_Lab
YouTube
What's up Hong Kong?
During our last visit to Hong Kong, not only did we take a lot of awesome pictures, but we also made a video that was shot a few hours before our flight to Tokyo. The venue is the very heart of Hong Kong, a skyscraper with a huge billboard.
It was a real…
It was a real…
Forwarded from ExploitHub
Content Security Policy (CSP) Bypasses http://ghostlulz.com/content-security-policy-csp-bypasses/
Forwarded from ExploitHub
Exploiting Imported Libraries to Bypass Cloudflare WAF
https://medium.com/bugbountywriteup/exploiting-imported-libraries-to-bypass-cloudflare-waf-7aed99186c5a
https://medium.com/bugbountywriteup/exploiting-imported-libraries-to-bypass-cloudflare-waf-7aed99186c5a
Medium
Exploiting Imported Libraries to Bypass WAF
Turning a P5 Content Injection into P3 Reflected XSS
Forwarded from ExploitHub
■■■□□ Arbitrary code execution on Facebook for Android.
https://medium.com/@dPhoeniixx/arbitrary-code-execution-on-facebook-for-android-through-download-feature-fb6826e33e0f
https://medium.com/@dPhoeniixx/arbitrary-code-execution-on-facebook-for-android-through-download-feature-fb6826e33e0f
Source: Twitter | Sayed AbdelhafizMedium
Arbitrary code execution on Facebook for Android through download feature
TL;DR
Forwarded from ExploitHub
Hacking HTTP CORS from inside out: a theory to practice approach
https://medium.com/bugbountywriteup/hacking-http-cors-from-inside-out-512cb125c528
https://medium.com/bugbountywriteup/hacking-http-cors-from-inside-out-512cb125c528
Medium
Hacking HTTP CORS from inside out
A theory to practice approach
Forwarded from ExploitHub
"RCE via LFI Log Poisoning - The Death Potion" https://shahjerry33.medium.com/rce-via-lfi-log-poisoning-the-death-potion-c0831cebc16d
Medium
RCE via LFI Log Poisoning - The Death Potion
Hello everyone, I would like to share one of my recent findings on a Vulnerability Disclosure Program. It is related to how I escalated to…
HACKING INETNO DG201A
I have ran my VDSL2 box happily in bridge mode and thinking that there is not that much of risk because the box should be just forwarding the packets to my firewall. After doing some changes to my VDSL -box I realized that for some strange reason it will take IP from the Internet even when it should be in bridged mode.
http://www.happyhacking.org/HappyHacking/hacking/2013/11/07/Hacking-Inetno-DG201A.html
I have ran my VDSL2 box happily in bridge mode and thinking that there is not that much of risk because the box should be just forwarding the packets to my firewall. After doing some changes to my VDSL -box I realized that for some strange reason it will take IP from the Internet even when it should be in bridged mode.
http://www.happyhacking.org/HappyHacking/hacking/2013/11/07/Hacking-Inetno-DG201A.html
www.happyhacking.org
Happy Hacking | Hacking Inetno DG201A
I love to hack and sometimes while hacking my devices I find all kinds of tricks and information which can’t be found with google. So my main reason for this page is to share information. I do all my hacks on my free time so there will be quiet times also.
WeMo Hacking
I've spent some time reverse engineering my WeMo switch. It's pretty cool and I figured out how to get it to do what I wanted. It's based on UPnP, which I found the miranda tool to be the best (closest to working with WeMo, and easiest to read)
I had to make some modifications to the miranda package to get it working, and to get it properly reporting the details of the device.
https://github.com/issackelly/wemo
I've spent some time reverse engineering my WeMo switch. It's pretty cool and I figured out how to get it to do what I wanted. It's based on UPnP, which I found the miranda tool to be the best (closest to working with WeMo, and easiest to read)
I had to make some modifications to the miranda package to get it working, and to get it properly reporting the details of the device.
https://github.com/issackelly/wemo
GitHub
GitHub - issackelly/wemo: wemo Proof of Concept. Should be used as a starting point for your own UPnP WeMo hacking
wemo Proof of Concept. Should be used as a starting point for your own UPnP WeMo hacking - issackelly/wemo
Forwarded from Cyber Threat Intelligence
BleepingComputer
FBI arrests man for plan to kill “70% of Internet” in AWS bomb attack
The FBI arrested a Texas man on Thursday for allegedly planning to "kill of about 70% of the internet" in a bomb attack targeting an Amazon Web Services (AWS) data center on Smith Switch Road in Ashburn, Virginia.