Pentester
@news4hack
2.91K
subscribers
119
photos
3
videos
163
files
2.77K
links
- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
Join
Pentester
2.91K subscribers
Pentester
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
ropnop blog
Upgrading Simple Shells to Fully Interactive TTYs
Catching a reverse shell over netcat is great…until you accidentally Ctrl-C and lose it. These techniques let you upgrade your shell to a proper TTY
Pentester
https://n0where.net/mitm-rdp-connections-seth
CyberPunk
MITM RDP Connections: Seth
Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials.
Pentester
https://decoder.cloud/2018/02/02/getting-system/amp/?__twitter_impression=true
Decoder's Blog
Getting SYSTEM
In your red teaming or pentesting activities escalating to SYSTEM on a Windows box is always the desired objective. The SYSTEM user is a special operating system user with the highest privilege, m…
Pentester
https://cxsecurity.com/issue/WLB-2018020095
Cxsecurity
Windows MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution - CXSecurity.com
sleepya has realised a new security note Windows MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
Pentester
https://blog.ripstech.com/2018/joomla-privilege-escalation-via-sql-injection/
Pentester
https://www.attackdebris.com/?p=311
Attack Debris
Kerberos Domain Username Enumeration
Kerberos Domain Username Enumeration Over recent years enumerating valid operating system level user names from up-to-date and well-maintained Windows environments, even from an internal test persp…
Pentester
https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/
EK
Pentest Tips and Tricks
Pentest Handy Tips and Tricks.
Pentester
https://payatu.com/reversing-exploiting-ble-4-0-communication/
Payatu
Reversing and Exploiting BLE 4.0 communication
This post is about exploiting BLE 4.0 communication. Learn how to conduct reverse engineering of BLE 4.0 communications and exploit it.
Pentester
https://securelist.com/a-slice-of-2017-sofacy-activity/83930/
Securelist
A Slice of 2017 Sofacy Activity
Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a highly active and prolific APT. From their high volume 0day deployment to their innovative and broad malware set, Sofacy is one of the top groups that we monitor, report, and protect against. 2017…
Pentester
https://github.com/netbiosX/Execute-CSharp-From-XSLT-TEST
GitHub
netbiosX/Execute-CSharp-From-XSLT-TEST
Contribute to Execute-CSharp-From-XSLT-TEST development by creating an account on GitHub.
Pentester
https://lockboxx.blogspot.ru/2018/02/intro-to-using-gscript-for-red-teams.html?m=1
lockboxx.blogspot.co.uk
Intro to Using GScript for Red Teams
A blog about information security, hacking, and protecting digital infrastructure. Penetration testing, malware analysis, and intrusion detection.
Pentester
https://devco.re/blog/2017/12/11/Exim-RCE-advisory-CVE-2017-16943-en/
DEVCORE 戴夫寇爾
Road to Exim RCE - Abusing Unsafe Memory Allocator in the Most Popular MTA | DEVCORE 戴夫寇爾
On 23 November, 2017, we reported two vulnerabilities to Exim. These bugs exist in the SMTP daemon and attackers do not need to be authenticated, including CVE-2017-16943 for a use-after-free (UAF) vulnerability, which leads to Remote Code Execution (RCE);…
Pentester
http://woshub.com/port-forwarding-in-windows/
Windows OS Hub
Configuring Port Forwarding in Windows | Windows OS Hub
You can configure network port forwarding in all Windows versions without using third-party tools. Using a port forwarding rule, you can redirect an incoming TCP connection (IPv4 or IPv6) from…
Pentester
https://github.com/rani-i/bluetoothdPoC
GitHub
GitHub - rani-i/bluetoothdPoC: CVE-2018-4087 PoC
CVE-2018-4087 PoC. Contribute to rani-i/bluetoothdPoC development by creating an account on GitHub.
Pentester
https://medium.com/@rootsecdev/abusing-windows-cached-credentials-in-metasploit-376b21e98e66
Medium
Abusing Windows Cached Credentials in Metasploit
This is a common issue I’ve run across that has several catch 22’s. What is the appropriate amount of cached credentials I should be…
Pentester
http://www.hackingarticles.in/understanding-guide-mimikatz/
Hacking Articles
Understanding Guide to Mimikatz
What is Mimikatz? Mimikatz is a Tool made in C Language by Benjamin Delpy. It is a great tool to extract plain text passwords, hashes
Pentester
https://researchcenter.paloaltonetworks.com/2018/02/unit42-sofacy-attacks-multiple-government-entities/
Unit 42
Sofacy Attacks Multiple Government Entities
Unit 42 examines recent Sofacy group activities including multiple attacks to government entities.
Pentester
https://github.com/danielbohannon/Invoke-CradleCrafter
GitHub
GitHub - danielbohannon/Invoke-CradleCrafter: PowerShell Remote Download Cradle Generator & Obfuscator
PowerShell Remote Download Cradle Generator & Obfuscator - danielbohannon/Invoke-CradleCrafter
Pentester
https://github.com/gdedrouas/Exchange-AD-Privesc
GitHub
GitHub - gdedrouas/Exchange-AD-Privesc: Exchange privilege escalations to Active Directory
Exchange privilege escalations to Active Directory - gdedrouas/Exchange-AD-Privesc
Pentester
https://github.com/worawit/MS17-010/blob/master/eternalblue_exploit8.py
GitHub
MS17-010/eternalblue_exploit8.py at master · worawit/MS17-010
MS17-010. Contribute to worawit/MS17-010 development by creating an account on GitHub.
Pentester
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/blob/master/README.md
GitHub
APT_CyberCriminal_Campagin_Collections/README.md at master · CyberMonitor/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection. Contribute to CyberMonitor/APT_CyberCriminal_Campagin_Collections development by creating an account on GitHub.