CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Free SMTP
mail.lifechangingfaith.com:587 angeliapelham@lifechangingfaith.com pelham
iamcigar.com:587 info@iamcigar.com ebxuo3Kb
dsprecision.net:587 hr@dsprecision.net dongsung123
smtp.netvigator.com:465(SSL) man1704@netvigator.com co386038
sidehustleapps.com:587 martin@sidehustleapps.com PukeHigh@18
rems.edu.gh:587 beatrice.atanga@rems.edu.gh atanga1
ingoanews.com:587 advertisement@ingoanews.com Anil$4959
joystickmd.com:587 sgalvez@joystickmd.com sejoco1970
agenciacamaleao.com:587 11bets@agenciacamaleao.com lucro123
webmail.rednosefoundation.org:587 dedi@rednosefoundation.org dedi123
webdesign.com.py:587 lisa@webdesign.com.py lzfg2501
wisecowconsultants.com:587 kartik@wisecowconsultants.com Wisecow!23
brandm3dia.com:587 alex@brandm3dia.com brandmedia
onwardpaper.com:587 chikamadu@onwardpaper.com chika2017
smtp.rucapanel.com.ar:587 presupuestos@rucapanel.com.ar Presupuestos12019
akc.mx:587 juridico@akc.mx Akc.2021
eaaconsultores.cl:587 fbarros@eaaconsultores.cl Francisca2022
gospectrumweb.com:587 support@gospectrumweb.com Gsw28844$
smtp.terra.com.br:587 tataisant@terra.com.br 250289
amgesolar.com.br:587 rhuan@amgesolar.com.br amg123
cetaenergy.com:587 t.thompson@cetaenergy.com t.thompson
smtp.kingwoodcable.com:587 collins3@kingwoodcable.com 12345
smtp.kingwoodcable.net:587 kmljersey@kingwoodcable.net Fatala1
Dragnmove.zip
271 KB
🔥Dragnmove is a post-exploitaition tool that infects files shared between users in order to move from one system to another. Dragnmove can detect actions like dropping a file into the browser window or attaching a file to an email client. After Dragnmove detects the action, it hooks CreateFile API calls to modify handles.
🔥You’ve Crossed the Line — Disturbing a Host’s Rest

Akamai Security Research dove deeply into MS-RPC research this past year. For a protocol that does so much, MS-RPC is largely under-researched, and it can have real-world effects. One of those effects is that vulnerabilities in an RPC interface become exposed. This is what we are focusing on in this blog post: vulnerabilities within the Local Session Manager (LSM) RPC interface.

🔥cve-2022-37973 PoC Exploit
🔥cve-2022-37998 PoC Exploit

🧰RPC Toolkit(set of tools, articles, blog posts and links to help security researchers drive their RPC research)
🔥Windows Contacts(примеры использования Windows Contact API ) RCE vuln(CVE-2022-44666)

⚠️Проблема(эта уязвимость покрывает не полностью проблему) не до конца исправлена, так что и подробности в виде рецензии от мелкомягких отложена на неопределенный срок!
#tools
#Red_Team_Tactics
1. Talon - password guessing tool that targets the Kerberos/LDAP services within the Windows AD environment
https://github.com/optiv/Talon
2. Bypass Rails::Html::SafeListSanitizer filtering and perform an XSS attack
https://hackerone.com/reports/1656627
3. Tool which can help to get NT AUTHORITY\SYSTEM from arbitrary directory creation bugs
https://github.com/binderlabs/DirCreate2System
Threat_Report_RedCanary_22.pdf
10.8 MB
#Analytics
#Threat_Research
"Red Canary’s 2022 Threat Detection Report".
DACLs_abuse.png
1.1 MB
#Infographics
#Offensive_security
DACLs (Active Directory Discretionary Access Control Lists) abuse
https://www.thehacker.recipes/ad/movement/dacl