#!/bin/bash
scan (){
timeout 1 bash -c "echo >/dev/tcp/192.168.8.109/$1 2>/dev/null " && echo "port $1 is open"
}
for port in {1..100}; do
scan $port &
done
scan (){
timeout 1 bash -c "echo >/dev/tcp/192.168.8.109/$1 2>/dev/null " && echo "port $1 is open"
}
for port in {1..100}; do
scan $port &
done
WinXP source code leaked cough cough https://mega.nz/file/PdhxBSZD#w-O3C-BAMwE4E02qPn_fSdTivILcE8hzk9PeyoXg7wU
mega.nz
File on MEGA
A different way of abusing Zerologon (CVE-2020-1472) - dirkjanm.io
https://dirkjanm.io/a-different-way-of-abusing-zerologon/
https://dirkjanm.io/a-different-way-of-abusing-zerologon/
dirkjanm.io
A different way of abusing Zerologon (CVE-2020-1472)
In August 2020, Microsoft patched CVE-2020-1472 aka Zerologon. This is in my opinion one of the most critical Active Directory vulnerabilities of the past few years, since it allows for instant escalation to Domain Admin without credentials. The most straightforward…
Exploiting: SSRF For Admin Access | by Gupta Bless | InfoSec Write-ups | Aug, 2020 | Medium
https://medium.com/bugbountywriteup/exploiting-ssrf-for-admin-access-31c30457cc44
https://medium.com/bugbountywriteup/exploiting-ssrf-for-admin-access-31c30457cc44
Medium
Exploiting: SSRF For Admin Access
Introduction:
GitHub - IoT-PTv/List-of-Tools: List of the tools and usage
https://github.com/IoT-PTv/List-of-Tools
https://github.com/IoT-PTv/List-of-Tools
GitHub
GitHub - IoT-PTv/List-of-Tools: List of the tools and usage
List of the tools and usage . Contribute to IoT-PTv/List-of-Tools development by creating an account on GitHub.
The Vault: UACMe 3.5, WD and the ways of mitigation
https://swapcontext.blogspot.com/2020/10/uacme-35-wd-and-ways-of-mitigation.html?m=1
https://swapcontext.blogspot.com/2020/10/uacme-35-wd-and-ways-of-mitigation.html?m=1
Blogspot
UACMe 3.5, WD and the ways of mitigation
Intro (warning this post if quite long) UACMe is a demonstrator tool initially developed following WinNT/Pitou research. It contains set of...
Make your own top-subdomains wordlist from FF history:
grep -Pao "https://[a-zA-Z0-9.-]+" ~/.mozilla/firefox/*/places.sqlite | sort -u | sed 's#.*://\([a-zA-Z0-9-]*\)\..*#\1#' | uniq -c | sort -rn
grep -Pao "https://[a-zA-Z0-9.-]+" ~/.mozilla/firefox/*/places.sqlite | sort -u | sed 's#.*://\([a-zA-Z0-9-]*\)\..*#\1#' | uniq -c | sort -rn
sudo iptables -nL f2b-sshd | awk '/REJECT/{print $4}' | xargs -n1 geoiplookup # Show the countries currently represented in your fail2ban ssh firewall jail table.
Remote Command Execution in Ruckus IoT Controller (CVE-2020-26878 & CVE-2020-26879) - Adepts of 0xCC
https://adepts.of0x.cc/ruckus-vriot-rce/
https://adepts.of0x.cc/ruckus-vriot-rce/