On modern #Windows systems one can capture traffic without sniffer, just by "netsh trace start capture=yes" command => ETL file created.
nmap-bootstrap-xsl
A Nmap XSL implementation with Bootstrap.
https://github.com/honze-net/nmap-bootstrap-xsl/
A Nmap XSL implementation with Bootstrap.
https://github.com/honze-net/nmap-bootstrap-xsl/
GitHub
GitHub - honze-net/nmap-bootstrap-xsl: A Nmap XSL implementation with Bootstrap.
A Nmap XSL implementation with Bootstrap. Contribute to honze-net/nmap-bootstrap-xsl development by creating an account on GitHub.
This media is not supported in your browser
VIEW IN TELEGRAM
Technical Advisory: Bypassing Workflows Protection Mechanisms - Remote Code Execution on SharePoint
bit.ly/2PoFU0H
bit.ly/2PoFU0H
PAExec is a free, redistributable and open source equivalent to Microsoft's popular PsExec application:
https://github.com/poweradminllc/PAExec
https://github.com/poweradminllc/PAExec
GitHub
GitHub - poweradminllc/PAExec: Remote execution, like PsExec
Remote execution, like PsExec. Contribute to poweradminllc/PAExec development by creating an account on GitHub.
Lateral Movement Using internetexplorer.Application Object ( COM )
https://homjxi0e.wordpress.com/2018/02/15/lateral-movement-using-internetexplorer-application-object-com/
https://homjxi0e.wordpress.com/2018/02/15/lateral-movement-using-internetexplorer-application-object-com/
matthomjxi0e
Lateral Movement Using internetexplorer.Application Object ( COM )
introduction Use Object COM ( InternetExplorer.Application ) For Execute using Types Exploit-internet Explorer For Execute ==> in Add On Internet Explorer For Get Execute Code using Lateral Move…
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2019-5475 Nexus Repository Manager 2 - OS Command Injection (authenticated)