hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Azure Attack Paths: Common Findings and Fixes (Part 1)
ZephrSec - Adventures In Information Security
Azure Attack Paths: Common Findings and Fixes (Part 1)
This post will walk through various services within the Azure catalogue and look at potential attack paths.
hack and bug bounty
Understanding Cobalt Strike Profiles - Updated for Cobalt Strike 4.6
ZephrSec - Adventures In Information Security
Understanding Cobalt Strike Profiles - Updated for Cobalt Strike 4.6
A deep dive into specifics around cobalt strike malleable c2 profiles and key information that is new in cobalt strike 4.6
hack and bug bounty
The SOCKS We Have at Home
www.n00py.io
The SOCKS We Have at Home
Introduction When performing penetration tests, we sometimes find that the systems or data we are targeting are not directly accessible from the network our attacking system is connected to. This is often the case when searching for things such a PCI data.…
hack and bug bounty
Bypassing Amazon Kids+ Parental Controls
www.n00py.io
Bypassing Amazon Kids+ Parental Controls
Recently for Christmas my 4 year old daughter got an Amazon Kids tablet. So far the tablet has been great and Kids+ seems like a pretty decent value for what you get. I'm very wary of the types of content available on the internet, and as a parent it's my…
hack and bug bounty
Bypassing Okta MFA Credential Provider for Windows
www.n00py.io
Bypassing Okta MFA Credential Provider for Windows
I'll state this upfront, so as not to confuse: This is a POST exploitation technique. This is mostly for when you have already gained admin on the system via other means and want to be able to RDP without needing MFA. Okta MFA Credential Provider for Windows…
hack and bug bounty
CactusCon 2023: BloodHound Unleashed
www.n00py.io
CactusCon 2023: BloodHound Unleashed
Here are the slides and video from my 2023 talk at CactusCon. The YouTube video currently is cut-off at the beginning, but if it gets fixed I'll update with a new link.
hack and bug bounty
Exploiting Resource Based Constrained Delegation (RBCD) with Pure Metasploit
www.n00py.io
Exploiting Resource Based Constrained Delegation (RBCD) with Pure Metasploit
Metasploit recently released version 6.3. With it came a whole lot of new features related to LDAP operations and using Kerberos authentication. In this blog I want to demonstrate how to perform a GenericWrite -> RBCD attack, which I find are very common.…
hack and bug bounty
Practical Attacks against NTLMv1
www.n00py.io
Practical Attacks against NTLMv1
This blog is meant to serve as a guide for practical exploitation of systems that allow for the NTLMv1 authentication protocol. While NTLMv1 is hardly ever needed anymore, a surprising number of organizations still use it, perhaps unknowingly. There are however…
hack and bug bounty
Password Spraying RapidIdentity Logon Portal
www.n00py.io
Password Spraying RapidIdentity Logon Portal
In the past I had written a quick blog post on password spraying Dell SonicWALL Virtual Office. While it wasn't all that exciting of a post, a number of people did find it useful and having a blog for it helped people find it more easily than only being…
hack and bug bounty
Manipulating User Passwords Without Mimikatz
www.n00py.io
Manipulating User Passwords Without Mimikatz
There are two common reasons you may want to change a user’s password during a penetration test: You have their NT hash but not their plaintext password. Changing their password to a known plaintext value can allow you to access services in which Pass-the…
hack and bug bounty
Unauthenticated Dumping of Usernames via Cisco Unified Call Manager (CUCM)
www.n00py.io
Unauthenticated Dumping of Usernames via Cisco Unified Call Manager (CUCM)
This blog is about something I found recently regarding Cisco Unified Call Manager (CUCM). While playing around with SeeYouCM Thief, which is designed to download parse configuration files from Cisco phone systems, I noticed something interesting within…
hack and bug bounty
Adding DCSync Permissions from Linux
www.n00py.io
Adding DCSync Permissions from Linux
Recently I came upon an attack path in BloodHound that looked like this: I had control of a computer object (an Exchange server) that effectively had WriteDacl over the domain. I had a few constraints as well: All systems were configured with EDR I only had…
hack and bug bounty
從 2013 到 2023: Web Security 十年之進化與趨勢!
Orange Tsai
從 2013 到 2023: Web Security 十年之進化與趨勢!
TL;DR for Hackers & Researchers: this is a more conceptual talk for web developers. All are in Mandarin but you can check the slides here if interested. 好久沒有打部落格了,紀錄一下這次我在 WebConf 2023 上的演講,大概就是把
hack and bug bounty
A New Attack Surface on MS Exchange Part 4 - ProxyRelay!
Orange Tsai
A New Attack Surface on MS Exchange Part 4 - ProxyRelay!
This is a cross-post blog from DEVCORE. You can check the series on: A New Attack Surface on MS Exchange Part 1 - ProxyLogon! A New Attack Surface on MS Exchange Part 2 - ProxyOracle! A New Attack S
hack and bug bounty
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS!
Orange Tsai
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS!
Hi, this is my fifth time speaking at Black Hat USA and DEFCON. You can get the slide copy and video there: Let’s Dance in the Cache - Destabilizing Hash Table on Microsoft IIS (slides) Let’s Dan
hack and bug bounty
A New Attack Surface on MS Exchange Part 3 - ProxyShell!
Orange Tsai
A New Attack Surface on MS Exchange Part 3 - ProxyShell!
P.S. This is a cross-post blog from Zero Day Initiative (ZDI) This is a guest post DEVCORE collaborated with Zero Day Initiative (ZDI) and published at their blog, which describes the exploit chain w
hack and bug bounty
A New Attack Surface on MS Exchange Part 2 - ProxyOracle!
Orange Tsai
A New Attack Surface on MS Exchange Part 2 - ProxyOracle!
Hi, this is the part 2 of the New MS Exchange Attack Surface. Because this article refers to several architecture introductions and attack surface concepts in the previous article, you could find the
hack and bug bounty
A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
Orange Tsai
A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
The series of A New Attack Surface on MS Exchange: A New Attack Surface on MS Exchange Part 1 - ProxyLogon! A New Attack Surface on MS Exchange Part 2 - ProxyOracle! A New Attack Surface on MS Excha
hack and bug bounty
Red Teaming 101 — Physical Access Controls
Medium
Red Teaming 101 — Physical Access Controls
Physical access controls are designed to prevent unauthorized access to secure areas directly. Examples of physical access controls…
hack and bug bounty
Useful Offensive Snippets
Medium
Useful Offensive Snippets
I will update this post regularly, I am starting with a few of my most commonly used snippets.