Sec Note – Telegram
Sec Note
1.39K subscribers
83 photos
5 videos
31 files
155 links
Download Telegram
👾3
Forwarded from 1N73LL1G3NC3
OWA Pentest Guide

В статье разобраны все основные атаки и уязвимости OWA и MS Exchange:
• OSINT
• Password spraying
• GAL/OAB
• Архитектура работы
• ZDI-CAN-22101
• OWA CAP Bypass
• CVE-2020-0688
• ProxyLogon
• CVE-2021-26855 - Pre-auth SSRF
• CVE-2021-27065 - Post-auth Arbitrary-File-Write
• ProxyOracle
• CVE-2021-31196 - The Padding Oracle
• CVE-2021-31195 - XSS
• Обход HttpOnly
• ProxyShell
• CVE-2021-34473 - Pre-auth Path Confusion leads to ACL Bypass
• CVE-2021-34523 - Exchange PowerShell Backend Elevation-of-Privilege
• CVE-2021-31207 - Post-auth Arbitrary-File-Write
• ProxyNotShell
• ProxyRelay
• Relay атаки


Thx: @pentestnotes
👾6
👾5
👾8
I've just realized that it was actually normal.😂😂😂
👾10
2024-05-02 - Dissecting LOCKBIT v3 ransomware.pdf
2 MB
👾5
👾4
2025-07-22 - Black Mass Volume III.pdf
3.1 MB
👾7
👾4
Breaking Control Flow Flattening: A Deep Technical Analysis

https://zerotistic.blog/posts/cff-remover/



advanced obfuscation with LLVM and template metaprogramming
https://0xpat.github.io/Malware_development_part_6/


basic Ultility To Generate C++ Codes That Applies Some Sort Of Control Flow Flattening Obfuscation On Your Projects.
https://github.com/PaulNorman01/Control-Flow-Flattening-Ultility

Building a Compile-Time Obfuscation Tool
https://medium.com/@bu19akov/building-a-compile-time-obfuscation-tool-c757effe19b5


Angr Control Flow Deobfuscation
https://research.openanalysis.net/angr/symbolic%20execution/deobfuscation/research/2022/03/26/angr_notes.html
1👾7
I wannabe Red Team Operator, so what Now?

Tools won’t make you a Red Teamer any more than a stethoscope makes you a doctor. What matters is knowing why, when, and how to use them. Surgically.
👾10
Meet the Malware: Extension
TigerJack's Extensions Continue to Rob Developers Blind Across Different Marketplaces


#stealer
👾2
DefenderWrite
Abusing Whitelisted Programs for Arbitrary Writes
👾4
Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities
Trend Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left after Lumma Stealer’s decline.

#stealer
👾6