Diving into Windows Remote Access Service for Pre-Auth Bugs
https://i.blackhat.com/BH-US-23/Presentations/US-23-YukiChen-Diving-into-Windows-Remote-Access.pdf
https://i.blackhat.com/BH-US-23/Presentations/US-23-YukiChen-Diving-into-Windows-Remote-Access.pdf
This allows you to spoof emails from any of the +2 Million domains using MailChannels. It also gives you a slightly higher chance of landing a spoofed emails from any domain that doesn't have an SPF & DMARC due to ARC adoption.
https://github.com/byt3bl33d3r/SpamChannel
https://github.com/byt3bl33d3r/SpamChannel
GitHub
GitHub - byt3bl33d3r/SpamChannel: Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)
Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk) - byt3bl33d3r/SpamChannel
Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions
https://github.com/machine1337/TelegramRAT
https://github.com/machine1337/TelegramRAT
GitHub
GitHub - root4031/TelegramRAT: Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions
Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions - root4031/TelegramRAT
Living Off the Foreign Land
Part 1/3: Setup Linux VM for SOCKS routing
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform
Part 2/3: Configuring the Offensive Windows VM
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-2
Part 3/3: Using Windows as Offensive Platform
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3
Part 1/3: Setup Linux VM for SOCKS routing
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform
Part 2/3: Configuring the Offensive Windows VM
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-2
Part 3/3: Using Windows as Offensive Platform
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3
BITSADMIN Blog
Living Off the Foreign Land - Part 1/3: Setup Linux VM for SOCKS routing
Living Off the Foreign Land (LOFL) allows attackers to use Windows' built-in powerful tooling (LOFLCABs) to attack remote systems. The first part in this 3-part article discusses how to setup the Linux VM to transparently tunnel traffic over SOCKS. This enables…
Vcenter Comprehensive Penetration and Exploitation Toolkit
https://github.com/W01fh4cker/VcenterKit
https://github.com/W01fh4cker/VcenterKit
GitHub
GitHub - W01fh4cker/VcenterKit: Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit - W01fh4cker/VcenterKit
❤1
Leveraging VSCode Extensions for Initial Access
https://www.mdsec.co.uk/2023/08/leveraging-vscode-extensions-for-initial-access/
https://www.mdsec.co.uk/2023/08/leveraging-vscode-extensions-for-initial-access/
MDSec
Leveraging VSCode Extensions for Initial Access - MDSec
Introduction On a recent red team engagement, MDSec were tasked with crafting a phishing campaign for initial access. The catch was that the in-scope phishing targets were developers with technical...
Apache Superset Part II: RCE, Credential Harvesting and More
https://www.horizon3.ai/apache-superset-part-ii-rce-credential-harvesting-and-more/
https://www.horizon3.ai/apache-superset-part-ii-rce-credential-harvesting-and-more/
Horizon3.ai
Apache Superset Part II: RCE, Credential Harvesting and More
Apache Superset is a popular open source data exploration and visualization tool. In a previous post, we disclosed a vulnerability, CVE-2023-27524, affecting thousands of Superset servers on the Internet, that enables unauthorized attackers to gain admin…
👍1
Bypassing UAC with SSPI Datagram Contexts
https://splintercod3.blogspot.com/p/bypassing-uac-with-sspi-datagram.html
https://splintercod3.blogspot.com/p/bypassing-uac-with-sspi-datagram.html
Cracking the final frontier: Reverse engineering and exploiting low-earth orbit satellites
https://cfp.recon.cx/2023/talk/3NU9DB/
https://cfp.recon.cx/2023/talk/3NU9DB/
cfp.recon.cx
Cracking the final frontier: Reverse engineering and exploiting low-earth orbit satellites 2023
Satellites play an indispensable role in modern life, providing essential services such as telecommunications, global navigation, and earth observation. In recent years, we've seen an explosive growth in the number of satellites, primarily in the Low Earth…
An all-in-one hacking tool written in Python to remotely exploit Android devices using #ADB (Android Debug Bridge) and #Metasploit-Framework.
https://github.com/AzeemIdrisi/PhoneSploit-Pro
https://github.com/AzeemIdrisi/PhoneSploit-Pro
GitHub
GitHub - AzeemIdrisi/PhoneSploit-Pro: An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework…
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session. - AzeemIdrisi/PhoneSploit-Pro
🔥4
CVE-2023-29357
Microsoft SharePoint Server Elevation of Privilege Vulnerability
https://github.com/Chocapikk/CVE-2023-29357
Microsoft SharePoint Server Elevation of Privilege Vulnerability
https://github.com/Chocapikk/CVE-2023-29357
GitHub
GitHub - Chocapikk/CVE-2023-29357: Microsoft SharePoint Server Elevation of Privilege Vulnerability
Microsoft SharePoint Server Elevation of Privilege Vulnerability - Chocapikk/CVE-2023-29357
A Deep Dive into Brute Ratel C4 payloads – Part 2
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads-part-2/
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads-part-2/
👍1