Release of an article on the experimental vector of pivoting against Windows
Caster - Windows Nightmare
https://blog.exploit.org/windows-nightmare
Caster - Windows Nightmare
https://blog.exploit.org/windows-nightmare
๐ฅ3โก1๐1
Beyond the Code: Art of AppSec in Java: Part 1
Master your knowledge of application security, follow best practices and become stronger with us.
https://blog.exploit.org/java-appsec/
Master your knowledge of application security, follow best practices and become stronger with us.
https://blog.exploit.org/java-appsec/
โค3๐ฅ3โก1
NetArmor v1.1 released
+ Fixed ClientHello packet detection in TLS Fingerprinting
+ Advanced HTTP/2 Fingerprinting according to Akamai's White Paper
+ JDK 11 and upper support
+ ALPN support in Reactor Netty Provider
Github
+ Fixed ClientHello packet detection in TLS Fingerprinting
+ Advanced HTTP/2 Fingerprinting according to Akamai's White Paper
+ JDK 11 and upper support
+ ALPN support in Reactor Netty Provider
Github
โค5๐ฅ5๐2โก1
Beyond the Code: Exposing in Disguise
In this article we will review the usage of such techniques as TLS (JA3) Fingerprinting, HTTP/2 Fingerprinting in a use case of malicious client detection.
https://blog.exploit.org/exposing-in-disguise/
In this article we will review the usage of such techniques as TLS (JA3) Fingerprinting, HTTP/2 Fingerprinting in a use case of malicious client detection.
https://blog.exploit.org/exposing-in-disguise/
๐7๐ฅ3โก2โค1
New version of Above v2.5 sniffer
+ The tool now handles all frames and packets in the air
+ New 5 protocols support: EAPOL, ARP, IGMP, DHCP, ICMPv6
+ New visual output of packets
+ Completely rewritten and simplified code, removed threads, removed dependency on pcap_analyzer
+ Fixed code for some protocols for error handling
https://github.com/casterbyte/Above/releases/tag/v2.5
+ The tool now handles all frames and packets in the air
+ New 5 protocols support: EAPOL, ARP, IGMP, DHCP, ICMPv6
+ New visual output of packets
+ Completely rewritten and simplified code, removed threads, removed dependency on pcap_analyzer
+ Fixed code for some protocols for error handling
https://github.com/casterbyte/Above/releases/tag/v2.5
GitHub
Release Above v2.5 (Codename: Ayrton Senna) ยท casterbyte/Above
The tool now handles all frames and packets in the air
New 5 protocols support: EAPOL, ARP, IGMP, DHCP, ICMPv6
New visual output of packets
Completely rewritten and simplified code, removed threads...
New 5 protocols support: EAPOL, ARP, IGMP, DHCP, ICMPv6
New visual output of packets
Completely rewritten and simplified code, removed threads...
๐6โค2๐ฅ2โก1
Pivoting against Windows is a fairly complex post-exploitation process. In this article I will demonstrate my new method of link layer pivoting using SoftEther and without a virtual machine
Caster โ Witchhammer
https://blog.exploit.org/witchhammer
Caster โ Witchhammer
https://blog.exploit.org/witchhammer
๐ฅ8โก1
Everything Lit: Ways to achieve UEFI persistence.
Just one view of "extreme" techniques. Imagination and knowledge is all you need!
https://blog.exploit.org/everything-lit/
Just one view of "extreme" techniques. Imagination and knowledge is all you need!
https://blog.exploit.org/everything-lit/
๐8๐ฅ2โก1
This media is not supported in the widget
VIEW IN TELEGRAM
โคโ๐ฅ46๐ฉ9๐6โค4๐คก4
Hi to all of those with superior taste and knowledge of true mastery.
Today we are giving away 10 Telegram Premiums amongst our subscribers.
Enjoy and hope the stakes play in your favour, while we do our job๐
Today we are giving away 10 Telegram Premiums amongst our subscribers.
Enjoy and hope the stakes play in your favour, while we do our job
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ32๐10โค5๐ณ4๐คฎ3
โ ๏ธPuTTY CVE-2024-31497 โ ๏ธ
๐ฐBrief: attacker can gain access to private key with public key and some signed messages on hand via forged identification signature of legitimate user. Signed messages may be publicly visible due to storage in public Git.
๐ฉPossibilities: login into any servers key was used in, supply chain attacks software maintained git, etc.
๐Affected versions: 0.80 and prior.
๐Full description: https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
๐ฐBrief: attacker can gain access to private key with public key and some signed messages on hand via forged identification signature of legitimate user. Signed messages may be publicly visible due to storage in public Git.
๐ฉPossibilities: login into any servers key was used in, supply chain attacks software maintained git, etc.
๐Affected versions: 0.80 and prior.
๐Full description: https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
๐ฑ17๐11๐ฅ3๐2๐2
MikroTik equipment is widely distributed all over the world and its security is an acute issue. In this paper, Caster covered many aspects related to the network security of MikroTik equipment.
Caster - Lockdown
https://blog.exploit.org/caster-routeros-lockdown
Caster - Lockdown
https://blog.exploit.org/caster-routeros-lockdown
โค15๐ฅ7๐4๐4โก1
Cisco equipment is widespread in production networks. In this article, Caster will demonstrate methods to protect Cisco IOS from network attacks.
Caster - Disciple
https://blog.exploit.org/caster-disciple
Caster - Disciple
https://blog.exploit.org/caster-disciple
โค16โก3๐ฅ3๐คฎ2
Poisoning attacks against Windows machines have become well known among pentesters. In this article, Caster will demonstrate how to detect poisoning attacks using Suricata.
Caster - Neurotransmitter
https://blog.exploit.org/caster-neurotransmitter
Caster - Neurotransmitter
https://blog.exploit.org/caster-neurotransmitter
๐ฅ8โค5โก2๐1๐1
Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
โค7๐5๐ฅ4โก1