hackspace
@hackspace
158
subscribers
279
photos
75
videos
23
files
998
links
hackspace
Download Telegram
Join
hackspace
158 subscribers
hackspace
https://redteamrecipe.com/aslr-exploitation-techniques?s=35
RedTeamRecipe
ASLR Exploitation Techniques
Address Space Layout Randomization (ASLR) is a security technique used in operating systems to protect against certain types of cyber attacks, particularly buffer overflow attacks. Here’s an overview of ASLR:
What is ASLR? ASLR is a feature implement...
hackspace
https://github.com/0xKayala/NucleiScanner?s=35
GitHub
GitHub - 0xKayala/NucleiScanner: NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications
NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications - 0xKayala/NucleiScanner
hackspace
https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9?s=35
Medium
ADCS ESC14 Abuse Technique
The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate mappings. An…
hackspace
https://learnk8s.io/graceful-shutdown?s=35
Learnk8s
Graceful shutdown in Kubernetes
In this article, you will learn how to prevent broken connections when a Pod starts up or shuts down. You will also learn how to shut down long-running tasks gracefully.
hackspace
hackspace
https://github.com/Sh3lldon/FullBypass?s=35
GitHub
GitHub - Sh3lldon/FullBypass: A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language…
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. - Sh3lldon/FullBypass
hackspace
hackspace
😁
1
hackspace
https://github.com/CCob/okta-terrify?s=35
GitHub
GitHub - CCob/okta-terrify: Okta Verify and Okta FastPass Abuse Tool
Okta Verify and Okta FastPass Abuse Tool. Contribute to CCob/okta-terrify development by creating an account on GitHub.
hackspace
hackspace
https://analyst1.com/ransomware-diaries-volume-5-unmasking-lockbit-2/
Analyst1
Ransomware Diaries Volume 5: Unmasking LockBit
Jon DiMaggio will explore how RansomedVC has redefined the boundaries of cybercrime by combining propaganda, influence campaigns, and misinformation.
hackspace
https://github.com/ad0nis/ntlm_relay_gat?s=35
GitHub
GitHub - ad0nis/ntlm_relay_gat
Contribute to ad0nis/ntlm_relay_gat development by creating an account on GitHub.
hackspace
https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/
dirkjanm.io
“Relaying” Kerberos - Having fun with unconstrained delegation
There have been some interesting new developments recently to abuse Kerberos in Active Directory, and after my dive into Kerberos across trusts a few months ago, this post is about a relatively unknown (from attackers perspective), but dangerous feature:…
hackspace
https://github.com/danialhalo/SqliSniper?s=35
GitHub
GitHub - danialhalo/SqliSniper: Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers
Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers - danialhalo/SqliSniper
hackspace
hackspace
https://github.com/Diverto/IPPrintC2
GitHub
GitHub - Diverto/IPPrintC2: PoC for using MS Windows printers for persistence / command and control via Internet Printing
PoC for using MS Windows printers for persistence / command and control via Internet Printing - Diverto/IPPrintC2
hackspace
https://github.com/umutcamliyurt/PingRAT
GitHub
GitHub - umutcamliyurt/PingRAT: PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads. - umutcamliyurt/PingRAT
hackspace
https://medium.com/@Intel_Ops/hunting-black-bastas-cobalt-strike-96a81a6ea781?s=35
Medium
Hunting Black Basta’s Cobalt Strike
Last week, the FBI and CISA released a #StopRansomware alert for the Black Basta ransomware group…
hackspace
https://www.assetnote.io/resources/research/two-bytes-is-plenty-fortigate-rce-with-cve-2024-21762
www.assetnote.io
Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762
Early this February, Fortinet released an advisory for an "out-of-bounds write vulnerability" that could lead to remote code execution. The issue affected the SSL VPN component of their FortiGate network appliance and was potentially already being exploited…
hackspace
https://securityonline.info/new-malvertising-campaign-leads-to-ransomware-through-trojanized-installers-of-winscp-and-putty/
Cybersecurity News
New Malvertising Campaign Leads to Ransomware Through Trojanized Installers of WinSCP and PuTTY
A widespread malvertising campaign is actively targeting individuals searching for popular utilities like WinSCP and PuTTY
hackspace
https://www.horizon3.ai/attack-research/cve-2023-34992-fortinet-fortisiem-command-injection-deep-dive/?s=35
Horizon3.ai
CVE-2023-34992: Fortinet FortiSIEM Command Injection Deep-Dive – Horizon3.ai
CVE-2023-34992 Fortinet FortiSIEM Command Injection Deep-Dive and Indicators of Compromise. This blog details a command injection vulnerability which allows an unauthenticated attacker to access the FortiSIEM server as root to execute arbitrary commands.
TWeb.init({scrollToPost:'hackspace/1205'});