Bypass firewalls by abusing DNS history
https://github.com/vincentcox/bypass-firewalls-by-DNS-history
https://github.com/vincentcox/bypass-firewalls-by-DNS-history
awesome tutorial for socket programming in C
http://www.cs.rpi.edu/~moorthy/Courses/os98/Pgms/socket.html
http://www.cs.rpi.edu/~moorthy/Courses/os98/Pgms/socket.html
Windows Hacking/Red teaming resources
https://docs.google.com/document/d/1HYPX0MMn2Qc0TNYRRIaaYU2GIbuTMXHm-JBhRR2vNMU/mobilebasic
https://docs.google.com/document/d/1HYPX0MMn2Qc0TNYRRIaaYU2GIbuTMXHm-JBhRR2vNMU/mobilebasic
https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191
#Microsoft Office binaries #winword #excel #powerpnt added to #lolbas || #lolbin
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Winword/
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Powerpnt/
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Excel/
#Microsoft Office binaries #winword #excel #powerpnt added to #lolbas || #lolbin
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Winword/
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Powerpnt/
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Excel/
Medium
Unsanitized file validation leads to Malicious payload download via Office binaries.
As a part of finding vulnerable endpoints to improve defence, I used to reckon legitimate binaries on any chance of masking for payload…
https://github.com/OWASP/Amass
OWASP Amass Tip
For ASNs:
amass intel -org OrgName
For domain names:
amass intel -active -asn n1,n2
For subdomains and infrastructure:
amass enum -src -ip -df domains.txt
OWASP Amass Tip
For ASNs:
amass intel -org OrgName
For domain names:
amass intel -active -asn n1,n2
For subdomains and infrastructure:
amass enum -src -ip -df domains.txt
GitHub
GitHub - owasp-amass/amass: In-depth attack surface mapping and asset discovery
In-depth attack surface mapping and asset discovery - owasp-amass/amass
This media is not supported in your browser
VIEW IN TELEGRAM
Henry Chen
@chybeta
CVE-2019-8451 Unauthorized SSRF via REST API /plugins/servlet/gadgets/makeRequest
use @ to bypass the whitelisting !
https://jira.atlassian.com/browse/JRASERVER-70001?filter=13085
@chybeta
CVE-2019-8451 Unauthorized SSRF via REST API /plugins/servlet/gadgets/makeRequest
use @ to bypass the whitelisting !
https://jira.atlassian.com/browse/JRASERVER-70001?filter=13085