ExcreamOnSecurity
411 subscribers
505 links
root@ExcreamOnSecurity: % cat ~/etc/topics.allow

- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
LATERAL MOVEMENT TO THE CLOUD WITH PASS-THE-PRT

Benjamin Delpy, author of Mimikatz, along with Dirk-jan Mollema have released research and code that show how attackers can perform lateral movement to the cloud with an attack called Pass-the-PRT. There have been some great detailed posts on this topic which I will reference throughout. My hope in this blog is to provide a simplified overview of the attack, how it works, and what you can do to protect yourself.

https://blog.stealthbits.com/lateral-movement-to-the-cloud-pass-the-prt/?utm_source=feedly&utm_medium=rss&utm_campaign=lateral-movement-to-the-cloud-pass-the-prt
#windows #ad #pentesting #redteaming
Bypass AMSI by manual modification part II - Invoke-Mimikatz

This blog post will cover some lets say more advanced AMSI triggers. I decided to build a custom Invoke-Mimikatz script without AMSI trigger. I will also cover some information how Invoke-Mimikatz basically works for those who did not know it before.

https://s3cur3th1ssh1t.github.io/Bypass-AMSI-by-manual-modification-part-II/
#windows #redteaming #bypass #evasion #amsi
StreamDivert: Relaying (specific) network connections

The first part of this blog will be the story of how this tool found it’s way into existence, the problems we faced and the thought process followed. The second part will be a more technical deep dive into the tool itself, how to use it, and how it works.

https://research.nccgroup.com/2020/09/10/streamdivert-relaying-specific-network-connections/
#redteaming #windows #tools
Detecting Microsoft 365 and Azure Active Directory Backdoors

Mandiant has seen an uptick in incidents involving Microsoft 365 (M365) and Azure Active Directory (Azure AD). Most of these incidents are the result of a phishing email coercing a user to enter their credentials used for accessing M365 into a phishing site. Other incidents have been a result of password spraying, password stuffing, or simple brute force attempts against M365 tenants. In almost all of these incidents, the user or account was not protected by multi-factor authentication (MFA).

https://www.fireeye.com/blog/threat-research/2020/09/detecting-microsoft-365-azure-active-directory-backdoors.html
#windows #blueteam #redteaming
Attack of the clones: Git clients remote code execution

The main focus of this blog post is GitHub Desktop. Other Git clients such as GitKraken, Git-Tower and SourceTree were also found to be vulnerable, however these have different exploitation scenarios that require user interaction.

https://blog.blazeinfosec.com/attack-of-the-clones-github-desktop-remote-code-execution/
#exploitation #windows #git
Hands off my service account!

Windows service accounts are one of the preferred attack surface for privilege escalation. If you are able to compromise such an account, it is quite easy to get the highest privileges, mainly due to the powerful impersonation privileges that are granted by default to services by the operating system.

https://decoder.cloud/2020/11/05/hands-off-my-service-account/
#windows #internals
Using and detecting C2 printer pivoting

This post introduces the novel concept of Command & Control (C2) using print jobs, and demonstrates how this can be achieved using C3's Print channel. It also explores the OPSEC considerations behind the use of this technique, and outlines the detection opportunities that it can create.

https://labs.f-secure.com/blog/print-c2/
#windows #ad #pivoting #redteaming #pentesting
31k$ SSRF in Google Cloud Monitoring led to metadata exposure

Google Cloud Monitoring (formerly called Stackdriver) is a service, which provides monitoring for cloud resources (VM instances, App Engine, Cloud functions...). It is available from Google Cloud Console. This service offers monitoring, alerting, uptime checks of cloud resources and much more. It is important to note that the Google Cloud Monitoring service itself is running on Google Cloud virtual machines.

https://nechudav.blogspot.com/2020/11/31k-ssrf-in-google-cloud-monitoring.html

#bugbounty #web #ssrf
Client-Side Prototype Pollution

If you are unfamiliar with Prototype Pollution Attack, you should read the following first:
JavaScript prototype pollution attack in NodeJS by Olivier Arteau
Prototype pollution – and bypassing client-side HTML sanitizers by Michał Bentkowski

https://github.com/BlackFan/client-side-prototype-pollution
#appsec #bugbounty #javascript
CVE-2020-17049: Kerberos Bronze Bit Attack – Theory

This attack expands upon the excellent research documented by Elad Shamir in “Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory.” I’ll cover the key points below, but his article a great resource and primer for Kerberos and constrained delegation in AD.

https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-theory/
#windows #ad #pentesting #kerberos #cve
CVE-2020-17049: Kerberos Bronze Bit Attack – Practical Exploitation

This post reviews how the Kerberos Bronze Bit vulnerability (CVE-2020-17049) can be exploited in practice. I strongly suggest first reading the Bronze Bit Attack in Theory post to understand why and how this attacks works.

https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-attack/
#windows #ad #pentesting #kerberos #cve