MSRPC-to-ATTACK/MS-DFSNM.md at main · jsecurity101/MSRPC-to-ATTACK · GitHub
https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-DFSNM.md
https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-DFSNM.md
GitHub
MSRPC-to-ATTACK/documents/MS-DFSNM.md at main · jsecurity101/MSRPC-to-ATTACK
A repository that maps commonly used attacks using MSRPC protocols to ATT&CK - jsecurity101/MSRPC-to-ATTACK
New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain
https://thehackernews.com/2022/06/new-ntlm-relay-attack-lets-attackers.html?m=1
https://thehackernews.com/2022/06/new-ntlm-relay-attack-lets-attackers.html?m=1
Domain Escalation – sAMAccountName Spoofing – Penetration Testing Lab
https://pentestlab.blog/2022/01/10/domain-escalation-samaccountname-spoofing/
https://pentestlab.blog/2022/01/10/domain-escalation-samaccountname-spoofing/
Penetration Testing Lab
Domain Escalation – sAMAccountName Spoofing
Computer accounts have the $ sign appended at the end of their names in contrast with standard user accounts. By default Microsoft operating systems lack of security controls and hardening that wou…
Attacking With WebView2 Applications | mr.d0x
https://mrd0x.com/attacking-with-webview2-applications/
https://mrd0x.com/attacking-with-webview2-applications/
Mrd0X
Security Research | mr.d0x
Providing security research and red team techniques
GitHub - mgeeky/ThreadStackSpoofer: Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
https://github.com/mgeeky/ThreadStackSpoofer
https://github.com/mgeeky/ThreadStackSpoofer
GitHub
GitHub - mgeeky/ThreadStackSpoofer: Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better…
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts. - mgeeky/ThreadStackSpoofer
Unrar Path Traversal Vulnerability affects Zimbra Mail
https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/
https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/
Sonarsource
Unrar Path Traversal Vulnerability affects Zimbra Mail
We discovered a vulnerability in Zimbra Enterprise Email that allows an unauthenticated, remote attacker fully take over Zimbra instances via a flaw in unrar.
👍1
Mez0: Vulpes: Obfuscating Memory Regions with Timers
https://mez0.cc/posts/vulpes-obfuscating-memory-regions/
https://mez0.cc/posts/vulpes-obfuscating-memory-regions/
Game Of Active Directory v2 | Mayfly
https://mayfly277.github.io/posts/GOADv2/
https://mayfly277.github.io/posts/GOADv2/
Mayfly
Game Of Active Directory v2
Yes another pentester blog..
GitHub - winterknife/PINKPANTHER: Windows x64 handcrafted token stealing kernel-mode shellcode
https://github.com/winterknife/PINKPANTHER
https://github.com/winterknife/PINKPANTHER
GitHub
GitHub - winterknife/PINKPANTHER: Windows x64 handcrafted token stealing kernel-mode shellcode
Windows x64 handcrafted token stealing kernel-mode shellcode - winterknife/PINKPANTHER
Brute Ratel C4 Red Teaming Tool Being Abused by Malicious Actors
https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/
https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/
Unit 42
When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors
Pentest and adversary emulation tool Brute Ratel C4 is effective at defeating modern detection capabilities – and malicious actors have begun to adopt it.
VOD will be up later, but the commands for a layer2 tunnel were:
sudo ssh -o Tunnel=ethernet -w 0:0 root@172.16.204.130
ip link add br0 type bridge
ip link set ens160 master br0
ip link set tap0 master br0
ip link set tap0 up (run on both ends)
ip link set br0 up
sudo ssh -o Tunnel=ethernet -w 0:0 root@172.16.204.130
ip link add br0 type bridge
ip link set ens160 master br0
ip link set tap0 master br0
ip link set tap0 up (run on both ends)
ip link set br0 up