How to bypass AMSI and execute ANY malicious Powershell code
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
zc00l blog
How to bypass AMSI and execute ANY malicious Powershell code
Hello again. In my previous posts I detailed how to manually get SYSTEM shell from Local Administrators users. That’s interesting but very late game during a penetration assessment as it is presumed that you already owned the target machine.
Post Exploitation Using WMIC (System Command)
http://www.hackingarticles.in/post-exploitation-using-wmic-system-command/
http://www.hackingarticles.in/post-exploitation-using-wmic-system-command/
Hacking Articles
Post Exploitation Using WMIC (System Command)
This article is about Post Exploitation using the WMIC (Windows Management Instrumentation Command Line). When an Attacker gains a meterpreter session on a Remote PC,
Kahu Security releases CMD Watcher, a tool that watches for the CMD process, suspends it, extracts the command line data, then kills it
http://www.kahusecurity.com/posts/cmd_watcher_and_maldocs.html
http://www.kahusecurity.com/posts/cmd_watcher_and_maldocs.html
Apereo CAS (Central Authentication Service) Remote Code Execution
https://github.com/frohoff/ysoserial/pull/99
https://github.com/frohoff/ysoserial/pull/99
Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes)
https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
byt3bl33d3r.github.io
Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes) // byt3bl33d3r // /dev/random > blog.py
byt3bl33d3r, /dev/random > blog.py
New LDAP & RDP Relay Vulnerabilities in NTLM
https://blog.preempt.com/new-ldap-rdp-relay-vulnerabilities-in-ntlm
https://www.youtube.com/watch?v=pKt9IJJOM3I
https://blog.preempt.com/new-ldap-rdp-relay-vulnerabilities-in-ntlm
https://www.youtube.com/watch?v=pKt9IJJOM3I
Invisi-Shell
Hide your powershell script in plain sight! Invisi-Shell bypasses all of Powershell security features (ScriptBlock logging, Module logging, Transcription, AMSI) by hooking .Net assemblies. The hook is performed via CLR Profiler API.
https://github.com/OmerYa/Invisi-Shell
Hide your powershell script in plain sight! Invisi-Shell bypasses all of Powershell security features (ScriptBlock logging, Module logging, Transcription, AMSI) by hooking .Net assemblies. The hook is performed via CLR Profiler API.
https://github.com/OmerYa/Invisi-Shell
GitHub
GitHub - OmerYa/Invisi-Shell: Hide your Powershell script in plain sight. Bypass all Powershell security features
Hide your Powershell script in plain sight. Bypass all Powershell security features - OmerYa/Invisi-Shell
Something special for the weekend...: A nice writeup on Universal #RCE #exploit by exploiting #Ruby 2.x #serialization
https://www.elttam.com.au/blog/ruby-deserialization/
https://www.elttam.com.au/blog/ruby-deserialization/
Feature, not bug: DNSAdmin to DC compromise in one line
https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
Medium
Feature, not bug: DNSAdmin to DC compromise in one line
Background
Have you checked your PSReadline history lately? Do you know it stores the commands in clear-text and is persistent across reboots? This is on a Domain Controller. #PowerShell #RedTeam
LethalHTA - A new lateral movement technique using DCOM and HTA
https://codewhitesec.blogspot.com/2018/07/lethalhta.html
https://codewhitesec.blogspot.com/2018/07/lethalhta.html
Blogspot
CODE WHITE | Blog: LethalHTA - A new lateral movement technique using DCOM and HTA
The following blog post introduces a new lateral movement technique that combines the power of DCOM and HTA. The research on this t...
PHP_imap_open_exploit
Bypassing disabled exec functions in PHP via imap_open (Debian & Ubuntu)
https://github.com/Bo0oM/PHP_imap_open_exploit
Bypassing disabled exec functions in PHP via imap_open (Debian & Ubuntu)
https://github.com/Bo0oM/PHP_imap_open_exploit
GitHub
GitHub - Bo0oM/PHP_imap_open_exploit: Bypassing disabled exec functions in PHP (c) CRLF
Bypassing disabled exec functions in PHP (c) CRLF. Contribute to Bo0oM/PHP_imap_open_exploit development by creating an account on GitHub.