w0rk3r's Windows Hacking Library – Telegram
w0rk3r's Windows Hacking Library
1.55K subscribers
10 photos
577 links
Manual job, I'm not a bot ;)

@BlueTeamLibrary
@W0rk3r
Download Telegram
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
Not a Security Boundary: Bypassing User Account Control
Matt Nelson at Derbycon 2017

Microsoft's User Account Control feature, introduced in Windows Vista, has been a topic of interest to many in the security community. Since UAC was designed to force user approval for administrative actions, attackers (and red teamers) encounter UAC on nearly every engagement. As a result, bypassing this control is a task that an actor often has to overcome, despite its lack of formal designation as a security boundary. This talk highlights what UAC is, previous work by others, research methodology, and details several technical UAC bypasses developed by the author.

https://youtu.be/c8LgqtATAnE

@SecTalks
MailSniper

MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an administrator to search the mailboxes of every user in a domain.

https://github.com/dafthack/MailSniper

@WindowsHackingLibrary
PowerLessShell rely on MSBuild.exe to remotely execute PowerShell noscripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.

https://github.com/Mr-Un1k0d3r/PowerLessShell

@WindowsHackingLibrary
This noscript will attempt to list and get TGTs for those users that have the property
'Do not require Kerberos preauthentication' set (UF_DONT_REQUIRE_PREAUTH).
For those users with such configuration, a John The Ripper output will be generated so
you can send it for cracking.

https://github.com/CoreSecurity/impacket/commit/bada8a719f8ed7be4633514eea94bc768dbaf019

@WindowsHackingLibrary