Ghaleb Al-otaibi
Stealthy WMI lateral movement - StealthyWMIExec.py
Stealthy WMI lateral movement - StealthyWMIExec.py Recently, I started reading wmiexec.py to learn how to write WMI with Impacket scripts. however, I saw how easy it was to detect WMIExec, because WMIexec uses the Win32_Process class and also uses the Create…
Forwarded from Ralf Hacker Channel (Ralf Hacker)
CVE-2026-24291: Windows LPE (RegPwn)
Exploit: https://github.com/mdsecactivebreach/RegPwn
Blog: https://www.mdsec.co.uk/2026/03/rip-regpwn/
BOF: https://github.com/Flangvik/RegPwnBOF
Patched: Mar 10, 2026
#lpe #pentest #redteam #ad #cve
Exploit: https://github.com/mdsecactivebreach/RegPwn
Blog: https://www.mdsec.co.uk/2026/03/rip-regpwn/
BOF: https://github.com/Flangvik/RegPwnBOF
Tested versions:
Windows 11 25h2
Windows 11 24h2
Windows 10 21h2
Windows Servers 2016/2019/2022
Patched: Mar 10, 2026
#lpe #pentest #redteam #ad #cve
GitHub
GitHub - mdsecactivebreach/RegPwn
Contribute to mdsecactivebreach/RegPwn development by creating an account on GitHub.
Forwarded from APT
EventLogin — CVE-2025-29969
A flaw in the MS-EVEN protocol. Low-privileged users can write arbitrary files to a remote machine, effectively bypassing the need for an administrator account for remote file writes
🔗 Source:
https://github.com/SafeBreach-Labs/EventLogin-CVE-2025-29969
🔗 Research:
https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/
#ad #windows #eventlog #rpc
A flaw in the MS-EVEN protocol. Low-privileged users can write arbitrary files to a remote machine, effectively bypassing the need for an administrator account for remote file writes
🔗 Source:
https://github.com/SafeBreach-Labs/EventLogin-CVE-2025-29969
🔗 Research:
https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/
#ad #windows #eventlog #rpc
www.opennet.ru
Уязвимости в snapd и Rust Сoreutils, позволяющие получить root-привилегии в Ubuntu
Компания Qualys выявила уязвимость (CVE-2026-3888) в организации работы связки snap-confine и systemd-tmpfiles в Ubuntu, позволяющую непривилегированному пользователю получить root-доступ к системе. Проблема проявляется в Ubuntu в конфигурации по умолчанию…
🔗Ссылка:
https://opennet.ru/65014/
https://opennet.ru/65014/
Google Cloud Blog
Ransomware Tactics, Techniques, and Procedures in a Shifting Threat Landscape | Google Cloud Blog
An overview of the ransomware landscape and common TTPs directly observed in 2025 ransomware incidents.