https://defuse.ca/race-conditions-in-web-applications.htm
https://medium.com/@ciph3r7r0ll/race-condition-bug-in-web-app-a-use-case-21fd4df71f0e
https://github.com/aaronhnatiw/race-the-web
https://medium.com/@ciph3r7r0ll/race-condition-bug-in-web-app-a-use-case-21fd4df71f0e
https://github.com/aaronhnatiw/race-the-web
defuse.ca
Practical Race Condition (TOCTTOU) Vulnerabilities in Web Applications - Defuse Security
Query-level race conditions can lead to serious but hard to find vulnerabilities in web applications.
Extracting Certificates From the Windows Registry
https://blog.nviso.be/2019/08/28/extracting-certificates-from-the-windows-registry/
https://blog.nviso.be/2019/08/28/extracting-certificates-from-the-windows-registry/
NVISO Labs
Extracting Certificates From the Windows Registry
I helped a colleague with a forensic analysis by extracting certificates from the Windows registry. In this blog post, we explain how to do this. The Windows registry contains binary blobs, contain…
Cisco UCS Director unauthenticated RCE as root (advisory + exploits)
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/cisco-ucs-rce.txt
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/cisco-ucs-rce.txt
Updated TikiLateral to use .NET WMI stuff instead of wmic on the command line
https://rastamouse.me/2019/06/the-return-of-aggressor/
https://rastamouse.me/2019/06/the-return-of-aggressor/
Cheatsheet containing various Kerberos attacks and PoCs
-ASREPRoast
-Kerberoasting
-Pass The Ticket (PTT)
-Silver ticket
-Golden ticket
https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a
-ASREPRoast
-Kerberoasting
-Pass The Ticket (PTT)
-Silver ticket
-Golden ticket
https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a
Gist
A cheatsheet with commands that can be used to perform kerberos attacks
A cheatsheet with commands that can be used to perform kerberos attacks - kerberos_attacks_cheatsheet.md
On modern #Windows systems one can capture traffic without sniffer, just by "netsh trace start capture=yes" command => ETL file created.
nmap-bootstrap-xsl
A Nmap XSL implementation with Bootstrap.
https://github.com/honze-net/nmap-bootstrap-xsl/
A Nmap XSL implementation with Bootstrap.
https://github.com/honze-net/nmap-bootstrap-xsl/
GitHub
GitHub - honze-net/nmap-bootstrap-xsl: A Nmap XSL implementation with Bootstrap.
A Nmap XSL implementation with Bootstrap. Contribute to honze-net/nmap-bootstrap-xsl development by creating an account on GitHub.
This media is not supported in your browser
VIEW IN TELEGRAM
Technical Advisory: Bypassing Workflows Protection Mechanisms - Remote Code Execution on SharePoint
bit.ly/2PoFU0H
bit.ly/2PoFU0H