AvePoint has fixed a vulnerability in DocAve, Perimeter and Compliance Guardian discovered by our researchers @m1ntko and @Calvaruga.
This vulnerability can be used to achieve Remote Code Execution (RCE) in affected systems.
➡️ Advisory: avepoint.com/company/docave…
Old Red Team Story:
@_apanonimo created something similar but as APK uploaded to the Android PlayStore spoofing the target company. It read the 2FA from SMS and autofilled it to login in the intranet, but also gave us access.
It stayed alive for months 😂
Old Red Team Story:
@_apanonimo created something similar but as APK uploaded to the Android PlayStore spoofing the target company. It read the 2FA from SMS and autofilled it to login in the intranet, but also gave us access.
It stayed alive for months 😂
Enhanced version of secretsdump from #Impacket to dump credentials without touching disk.
This feature takes advantage of the WriteDACL privileges held by local administrators to provide temporary read permissions on registry hives.
github.com/fortra/impacke…
As someone involved in the AWS offsec space, I want to share why I strongly do NOT recommend the HackTricks AWS Red Team Expert course. The author of it is a plagiarist, stealing content from other creators and is directly profiting off of it through sponsorships. A 🧵
Our colleague @IagoAbad has weaponized the leaked token handles technique for MSSQL.
Now open token handles in MSSQL's process (sqlservr.exe) can be abused to change security context and escalate privileges both locally and in the domain.
github.com/blackarrowsec/…
My 2cents: before using something random you saw on twitter/Github, think twice how it works and if it is worth or just crap. And, please, don't reuse infra in your attacks 🤣
Watchguard has fixed 4 vulnerabilities in Watchguard EPDR discovered by our researchers @antuache and @Calvaruga.
These vulnerabilities can be used to turn-off the defensive capabilities of the product and achieve privilege escalation.
➡️ Advisories: watchguard.com/es/wgrd-psirt/…
Finally I figured it out how to remove your username and other undesired absolute path strings from Rust binaries. It's pretty simple, but I've added it to the tips and tricks repository in case anyone has been struggling with this issue as well. github.com/Kudaes/rust_ti…
In our latest post, @xassiz introduces a new technique to obtain cleartext passwords from MSSQL by abusing linked servers through the ADSI provider.
➡️ Read more: tarlogic.com/blog/linked-se…
New process injection technique through entry points hijacking.
- Threadless or threaded, at will.
- No hooking.
- No RWX memory permissions.
- No new threads with start address pointing to the injected shellcode.
github.com/Kudaes/EPI
I've found that fibers may be something to look at when it comes to execute local in-memory code. This is a simple PoC of how you can leverage fibers to execute in-memory code without spawning threads and hiding suspicious thread stacks among others.
github.com/Kudaes/Fiber
Have you ever tried exploiting a Spring Boot Actuators RCE but the restart endpoint was disabled?
⬇️ Abuse this behaviour using this #TrickOrThreat by @antuache
SCCM takeover by abusing automatic client push installation has less requirements than I thought. Check this post out for a detailed walkthrough and recommendations. Install KB15599094 and disable NTLM for client push installation to prevent this attack.
posts.specterops.io/sccm-site-take…
SpecterOps revisits AD CS after the Certifried (CVE-2022–26923) patch and includes our research around ESC7, among others.
➡️ Our research: tarlogic.com/blog/ad-cs-man…
🧵 A summary thread:
SpecterOps revisits AD CS after the Certifried (CVE-2022–26923) patch and includes our research around ESC7, among others.
➡️ Our research: tarlogic.com/blog/ad-cs-man…
🧵 A summary thread:
We've extended @nopfor\ntlm_challenger with MSSQL support! This is useful when network segmentation prevents from reaching the SMB port
➡️ github.com/nopfor/ntlm_ch…
0 Followers 589 FollowingFrom a hopeless crush on a captivating stranger, a bitter curse emerged, transforming their once innocent love into a twisted obsession.
To MsPsychology1
85 Followers 358 FollowingAdvanced script kiddie who digs on true hacking methodologies. I also like cats with evaporation power.
Bsky: https://t.co/tRA05htE7Q
466 Followers 88 FollowingAsociación de fans de @MovistarKOI inscrita en el registro nacional de asociaciones 💜 ⚡ 💜
Discord https://t.co/sPd38e6mi6
Únete en 👇
12K Followers 488 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
1.2M Followers 0 FollowingEmpowering users to create a better-informed world.
We're open source and data is publicly available: https://t.co/Te3IjR10Ix
Q? Reply/DM
10K Followers 3K Following«A la ausencia no hay quien se acostumbre. Otro sol no es tu sol aunque te alumbre». M. Benedetti #puravidamario🕊️💔 FUNDACIÓN MARIO AZÚA
359 Followers 5 Followingmnemonic is a leader in 24x7 Managed Detection and Response (MDR) services, incident response, threat intelligence and risk management.
197K Followers 2 FollowingAutor de 'La gran conspiración, cómo las redes sociales controlan tu vida' 📝
Cuenta oficial de ELLOS.
Organización organizada.
Cuenta CNI de manual.
101K Followers 145 FollowingA portable multi-tool device in a toy-like body for pentesters and hardware geeks. Buy worldwide here ➡️ https://t.co/n09EKVnqri
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
183 Followers 17 FollowingUnha comunidade galega sobre seguridade informática e outros temas. A galician community about computer security and other stuff.
195K Followers 14K FollowingWe help professionals acquire the skills, knowledge and certificates by teaching defense through offense to advance their careers in cybersecurity.
14K Followers 916 FollowingWindows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses! 🚀 #WindowsInternals #TrainSec