Forwarded from 卩ro 爪Cracker
SGX.Fail - Overview of SGX Attacks
https://sgx.fail/
Submitted November 30, 2022 at 07:59AM by Gallus
via reddit https://ift.tt/fptIBWk
https://sgx.fail/
Submitted November 30, 2022 at 07:59AM by Gallus
via reddit https://ift.tt/fptIBWk
Reddit
From the netsec community on Reddit: SGX.Fail - Overview of SGX Attacks
Posted by Gallus - 13 votes and 0 comments
Forwarded from 卩ro 爪Cracker
Hive Ransomware v5-5.2 file decryption tool
https://github.com/reecdeep/HiveV5_file_decryptor
https://github.com/reecdeep/HiveV5_file_decryptor
GitHub
GitHub - reecdeep/HiveV5_file_decryptor: Hive v5 file decryption algorithm
Hive v5 file decryption algorithm. Contribute to reecdeep/HiveV5_file_decryptor development by creating an account on GitHub.
👍1
🔥Home Grown Red Team: Lateral Movement With Havoc C2 And Microsoft EDR
Lateral movement is extremely important for any red team engagement. Getting your initial shell is great, but if you can’t move off the box you could be dead in the water.
Lateral movement is extremely important for any red team engagement. Getting your initial shell is great, but if you can’t move off the box you could be dead in the water.
👍2
pwn and own the Sonos.pdf
14.4 MB
📕A Journey To Pwn And Own The Sonos One Speaker
Forwarded from 卩ro 爪Cracker
Exploiting an N-day vBulletin PHP Object Injection Vulnerability
https://karmainsecurity.com/exploiting-an-nday-vbulletin-php-object-injection
THX #APTIran
https://karmainsecurity.com/exploiting-an-nday-vbulletin-php-object-injection
Forwarded from 卩ro 爪Cracker
RFC 8628 lets you phish people even if they're using WebAuthn
https://ift.tt/cpNIYLj
Submitted December 01, 2022 at 05:44AM by sanitybit
via reddit https://ift.tt/T2z6uwx
https://ift.tt/cpNIYLj
Submitted December 01, 2022 at 05:44AM by sanitybit
via reddit https://ift.tt/T2z6uwx
Forwarded from 卩ro 爪Cracker
The PenTesters Framework (PTF)
A Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As #pentesters, we've been accustom to the /pentest/ directories or our own toolsets that we want to keep up-to-date all of the time. We have those "go to" tools that we use on a regular basis, and using the latest and greatest is important.
PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and make it so that you can install/update your distribution on any machine. Everything is organized in a fashion that is cohesive to the Penetration Testing Execution Standard (PTES) and eliminates a lot of things that are hardly used. PTF simplifies installation and packaging and creates an entire pentest framework for you. Since this is a framework, you can configure and add as you see fit. We commonly see internally developed repos that you can use as well as part of this framework. It's all up to you.
https://github.com/trustedsec/ptf
For a video tutorial on how to use PTF, check out our Vimeo page here: https://vimeo.com/137133837
A Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As #pentesters, we've been accustom to the /pentest/ directories or our own toolsets that we want to keep up-to-date all of the time. We have those "go to" tools that we use on a regular basis, and using the latest and greatest is important.
PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and make it so that you can install/update your distribution on any machine. Everything is organized in a fashion that is cohesive to the Penetration Testing Execution Standard (PTES) and eliminates a lot of things that are hardly used. PTF simplifies installation and packaging and creates an entire pentest framework for you. Since this is a framework, you can configure and add as you see fit. We commonly see internally developed repos that you can use as well as part of this framework. It's all up to you.
https://github.com/trustedsec/ptf
For a video tutorial on how to use PTF, check out our Vimeo page here: https://vimeo.com/137133837
Forwarded from 卩ro 爪Cracker
Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) - SUID-root program installed by default on Ubuntu
https://ift.tt/OvQHKgX
Submitted December 01, 2022 at 07:23AM by Gallus
via reddit https://ift.tt/07bJkwg
https://ift.tt/OvQHKgX
Submitted December 01, 2022 at 07:23AM by Gallus
via reddit https://ift.tt/07bJkwg
seclists.org
oss-sec: Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
Forwarded from 卩ro 爪Cracker
Remote code execution bug in FreeBSD's ping (CVE-2022-23093)
https://ift.tt/TrukG2P
Submitted December 01, 2022 at 09:40AM by Gallus
via reddit https://ift.tt/xfckVmZ
https://ift.tt/TrukG2P
Submitted December 01, 2022 at 09:40AM by Gallus
via reddit https://ift.tt/xfckVmZ
Forwarded from 卩ro 爪Cracker
Bypassing Web Application Firewalls
https://ift.tt/ad0kRiL
Submitted December 01, 2022 at 04:51PM by ma-ni
via reddit https://ift.tt/fH8D37r
https://ift.tt/ad0kRiL
Submitted December 01, 2022 at 04:51PM by ma-ni
via reddit https://ift.tt/fH8D37r
Forwarded from 卩ro 爪Cracker
Coercer-master.zip
5.9 MB
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods.
https://github.com/p0dalirius/Coercer
https://github.com/p0dalirius/Coercer
#DFIR
Emotet Strikes Again - LNK File Leads to Domain Wide Ransomware
https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware
Emotet Strikes Again - LNK File Leads to Domain Wide Ransomware
https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware
The DFIR Report
Emotet Strikes Again - LNK File Leads to Domain Wide Ransomware - The DFIR Report
In June of 2022, we observed a threat actor gaining access to an environment via Emotet and operating over a eight day period. During this time period, multiple rounds of enumeration and lateral movement occurred using Cobalt Strike. Remote access tools were…