Rogue RDP – Revisiting Initial Access Methods
https://www.blackhillsinfosec.com/rogue-rdp-revisiting-initial-access-methods/
#reverse #windows
https://www.blackhillsinfosec.com/rogue-rdp-revisiting-initial-access-methods/
#reverse #windows
👍2🔥2
Напозорились... слили все что могли
В свободном доступе выложили архив сервиса «Яндекс.Еда»
https://habr.com/ru/news/t/654039/
В свободном доступе выложили архив сервиса «Яндекс.Еда»
https://habr.com/ru/news/t/654039/
Хабр
В свободном доступе выложили архив сервиса «Яндекс.Еда» с данными заказов клиентов, «Яндекс» ранее подтвердил утечку
По информации Telegram-канала «Утечки информации», в свободном доступе появился архив сервиса «Яндекс.Еда» с данными заказов клиентов. «Яндекс» ранее подтвердил факт утечки, но не раскрывал ее детали....
😱3
В таких условиях, что нынче сложились хваленый отечественный ИТ гигант (который юридически зарегистрирован в Нидерландах) теряет свои понты и может оказаться в дефолте
https://www.cnews.ru/news/top/2022-03-04_yandeks_okazalsya_na_grani
https://www.cnews.ru/news/top/2022-03-04_yandeks_okazalsya_na_grani
CNews.ru
«Яндекс» заявил о риске своего дефолта - CNews
«Яндекс» может оказаться не в состоянии выкупить свои облигации у акционеров, торги которыми были приостановлены...
😱4👍2
Network Infrastructure Security Guidance, March 2022 (PP-22-0266 Version 1.0)
This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.
#cisco #docs
This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.
#cisco #docs
👍2
1646228506913.pdf
906.6 KB
Network Infrastructure Security Guidance, March 2022 (PP-22-0266 Version 1.0)
👍1
A collection of Windows Server 2019 and Windows 10 hardening noscripts
GitHub
https://github.com/atlantsecurity/windows-hardening-noscripts
#windows #hardening
GitHub
https://github.com/atlantsecurity/windows-hardening-noscripts
#windows #hardening
👍6
Карты по сетевому стеку
+ Network Communication Protocols Map
+ OSI Layers
GitHub
https://gist.github.com/CMCDragonkai/14a21fc387b8ea6f585c882d0d0d9334
+ Network Communication Protocols Map
+ OSI Layers
GitHub
https://gist.github.com/CMCDragonkai/14a21fc387b8ea6f585c882d0d0d9334
👍4
Любителям бинарщины - разбор примера использования техники эксплуатации переполнения буфера для повышения привилегий в системе с кодом на С
https://blog.pentesteracademy.com/exploiting-buffer-overflow-vulnerability-to-do-privilege-escalation-4a1de492a8c5
https://blog.pentesteracademy.com/exploiting-buffer-overflow-vulnerability-to-do-privilege-escalation-4a1de492a8c5
Medium
Exploiting Buffer Overflow vulnerability to do Privilege Escalation
A buffer overflow occurs when the data provided to the program goes out of the allocated memory space and also corrupts the contents of…
❤2
Разбор эксплуатации CVE на домене контроллера от Rapid7, разработчика известного сканера безопасности
https://www.rapid7.com/blog/post/2022/02/14/dropping-files-on-a-domain-controller-using-cve-2021-43893/
#windows
https://www.rapid7.com/blog/post/2022/02/14/dropping-files-on-a-domain-controller-using-cve-2021-43893/
#windows
Rapid7
Dropping Files on a Domain Controller Using CVE-2021-43893 | Rapid7 Blog
Security analysts who have some knowledge of Active Directory and pentesting would know the concept of tickets. Kerberos, the default authentication mechanism in an AD, uses ticket-based authentication where a Key Distribution Center (KDC) grants a Ticket-Granting Ticket (TGT) to a user requesting access to a service or an account, which can then be redeemed to generate a service ticket (ST) to access a particular service, like an SQL account.
Golden Ticket attacks show how an attacker can keep accessing the domain admin by obtaining the NTLM hash of the "krbtgt" account.
Domain persistence is necessary for an analyst in the event the admin password gets changed. Persistence can also be achieved by using certificate-based authentication deployed in the Active Directory Certificate Service. One such method is the Golden Certificate Attack.
#windows
Golden Ticket attacks show how an attacker can keep accessing the domain admin by obtaining the NTLM hash of the "krbtgt" account.
Domain persistence is necessary for an analyst in the event the admin password gets changed. Persistence can also be achieved by using certificate-based authentication deployed in the Active Directory Certificate Service. One such method is the Golden Certificate Attack.
#windows
👍2🔥1
Free Pentester's Lab by PentersterAcademy (USA)
Sources
https://attackdefense.pentesteracademy.com/
#education #pentest
Sources
https://attackdefense.pentesteracademy.com/
#education #pentest
👍4