Pentester
@news4hack
2.91K
subscribers
119
photos
3
videos
163
files
2.77K
links
- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
Join
Pentester
2.91K subscribers
Pentester
https://embedi.com/blog/grim-iot-reaper-1-and-0-day-vulnerabilities-at-the-service-of-botnets/
Embedi
Grim IoT Reaper: 1- and 0-day vulnerabilities at the service of botnets
On the 19th of October, 2017, the world of IoT shuddered, facing a new enemy – a huge botnet that would be later called Reaper. Reaper is grim and is by far grimmer than the notorious Mirai botnet. According to the data provided by 360 Netlab, it has already…
Pentester
http://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/
Absolomb
Windows Privilege Escalation Guide
Privilege escalation always comes down to proper enumeration. But to accomplish proper enumeration you need to know what to check and look for. This takes familiarity with systems that normally comes along with experience. At first privilege escalation can…
Pentester
Посмотрите, о чем твитнул(а)
@NahamSec
:
https://twitter.com/NahamSec/status/958042761357217792?s=09
Twitter
Ben Sadeghipour
¯\_(ツ)_/¯
Pentester
https://astr0baby.wordpress.com/2018/01/30/running-latest-x64-mimikatz-on-windows-10/amp/?__twitter_impression=true
Astr0baby's not so random thoughts _____ rand() % 100;
Running latest x64 Mimikatz on Windows 10
I have been keeping this journal for 7 years now and I guess this is a reason to add some interesting stuff (lately I have been busy in the compiler world on various architectures and different de…
Pentester
https://securityonline.info/top-7-nmap-nse-scripts-for-reconnmap-scannmap-tutorialnmap-download/?utm_source=ReviveOldPost&utm_medium=social&utm_campaign=ReviveOldPost
Penetration Testing
Top 7 Nmap NSE Scripts Recon,nmap nse,nmap tutorial,nmap scan
Top 7 Nmap NSE Scripts Recon,nmap nse,nmap tutorial,nmap scan,nmap download,advance nmap tutorial,nmap script nse,zmap nmap tutorial
Pentester
https://github.com/k0keoyo/kDriver-Fuzzer
GitHub
GitHub - k0keoyo/kDriver-Fuzzer
Contribute to k0keoyo/kDriver-Fuzzer development by creating an account on GitHub.
Pentester
https://github.com/L3cr0f/DccwBypassUAC
GitHub
GitHub - L3cr0f/DccwBypassUAC: Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe". - L3cr0f/DccwBypassUAC
Pentester
https://github.com/samdenty99/injectify
GitHub
GitHub - samdenty/injectify: Perform advanced MiTM attacks on websites with ease
💉
Perform advanced MiTM attacks on websites with ease
💉
- samdenty/injectify
Pentester
https://github.com/dxa4481/cssInjection
GitHub
GitHub - dxa4481/cssInjection: Stealing CSRF tokens with CSS injection (without iFrames)
Stealing CSRF tokens with CSS injection (without iFrames) - dxa4481/cssInjection
Pentester
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
ropnop blog
Upgrading Simple Shells to Fully Interactive TTYs
Catching a reverse shell over netcat is great…until you accidentally Ctrl-C and lose it. These techniques let you upgrade your shell to a proper TTY
Pentester
https://n0where.net/mitm-rdp-connections-seth
CyberPunk
MITM RDP Connections: Seth
Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials.
Pentester
https://decoder.cloud/2018/02/02/getting-system/amp/?__twitter_impression=true
Decoder's Blog
Getting SYSTEM
In your red teaming or pentesting activities escalating to SYSTEM on a Windows box is always the desired objective. The SYSTEM user is a special operating system user with the highest privilege, m…
Pentester
https://cxsecurity.com/issue/WLB-2018020095
Cxsecurity
Windows MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution - CXSecurity.com
sleepya has realised a new security note Windows MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
Pentester
https://blog.ripstech.com/2018/joomla-privilege-escalation-via-sql-injection/
Pentester
https://www.attackdebris.com/?p=311
Attack Debris
Kerberos Domain Username Enumeration
Kerberos Domain Username Enumeration Over recent years enumerating valid operating system level user names from up-to-date and well-maintained Windows environments, even from an internal test persp…
Pentester
https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/
EK
Pentest Tips and Tricks
Pentest Handy Tips and Tricks.
Pentester
https://payatu.com/reversing-exploiting-ble-4-0-communication/
Payatu
Reversing and Exploiting BLE 4.0 communication
This post is about exploiting BLE 4.0 communication. Learn how to conduct reverse engineering of BLE 4.0 communications and exploit it.
Pentester
https://securelist.com/a-slice-of-2017-sofacy-activity/83930/
Securelist
A Slice of 2017 Sofacy Activity
Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a highly active and prolific APT. From their high volume 0day deployment to their innovative and broad malware set, Sofacy is one of the top groups that we monitor, report, and protect against. 2017…
Pentester
https://github.com/netbiosX/Execute-CSharp-From-XSLT-TEST
GitHub
netbiosX/Execute-CSharp-From-XSLT-TEST
Contribute to Execute-CSharp-From-XSLT-TEST development by creating an account on GitHub.
Pentester
https://lockboxx.blogspot.ru/2018/02/intro-to-using-gscript-for-red-teams.html?m=1
lockboxx.blogspot.co.uk
Intro to Using GScript for Red Teams
A blog about information security, hacking, and protecting digital infrastructure. Penetration testing, malware analysis, and intrusion detection.
Pentester
https://devco.re/blog/2017/12/11/Exim-RCE-advisory-CVE-2017-16943-en/
DEVCORE 戴夫寇爾
Road to Exim RCE - Abusing Unsafe Memory Allocator in the Most Popular MTA | DEVCORE 戴夫寇爾
On 23 November, 2017, we reported two vulnerabilities to Exim. These bugs exist in the SMTP daemon and attackers do not need to be authenticated, including CVE-2017-16943 for a use-after-free (UAF) vulnerability, which leads to Remote Code Execution (RCE);…