๐ฆThis one command is enough to knock down your entire wifi.
-S : Send syn packets
--flood : Sent packets as fast as possible
Simple DOS attack, works really well on non-enterprise networks. Implement firewall/filter rules in your router to avoid these attacks.
However in some cases it can increase resources usage on router that could still lead to crashes.
Ref: Steven Lim
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
-S : Send syn packets
--flood : Sent packets as fast as possible
Simple DOS attack, works really well on non-enterprise networks. Implement firewall/filter rules in your router to avoid these attacks.
However in some cases it can increase resources usage on router that could still lead to crashes.
Ref: Steven Lim
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆTop Shodan Dorks for Finding Sensitive IoT Data ๐
Are you testing IoT devices and systems for vulnerabilities? Shodan, the search engine for internet-connected devices, can reveal critical data with the right queries.
This cheat sheet contains useful Shodan dorks to identify exposed services, misconfigurations, and unsecured devices, such as: โ Open ports: 23 (Telnet), 21 (FTP), 3306 (MySQL)
โ Exposed services: PostgreSQL, MongoDB, Apache, Jenkins, MikroTik
โ Sensitive information: "MongoDB Server Information," "200 OK" responses, and certificate details
Some highlights include:
Finding unprotected remote desktops (port:3389)
Identifying insecure databases (port:27017, MongoDB authentication disabled)
Locating industrial devices and firmware (port:5006,5007 Mitsubishi)
Why does this matter?
IoT devices are often overlooked and can serve as easy targets for attackers if not properly secured. By searching for exposed ports and services, security researchers can help organizations address these risks proactively.
๐ข A friendly reminder: Use this knowledge responsibly. Only test systems you have permission to access!
Ref: AMIT KUMARAMIT KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Are you testing IoT devices and systems for vulnerabilities? Shodan, the search engine for internet-connected devices, can reveal critical data with the right queries.
This cheat sheet contains useful Shodan dorks to identify exposed services, misconfigurations, and unsecured devices, such as: โ Open ports: 23 (Telnet), 21 (FTP), 3306 (MySQL)
โ Exposed services: PostgreSQL, MongoDB, Apache, Jenkins, MikroTik
โ Sensitive information: "MongoDB Server Information," "200 OK" responses, and certificate details
Some highlights include:
Finding unprotected remote desktops (port:3389)
Identifying insecure databases (port:27017, MongoDB authentication disabled)
Locating industrial devices and firmware (port:5006,5007 Mitsubishi)
Why does this matter?
IoT devices are often overlooked and can serve as easy targets for attackers if not properly secured. By searching for exposed ports and services, security researchers can help organizations address these risks proactively.
๐ข A friendly reminder: Use this knowledge responsibly. Only test systems you have permission to access!
Ref: AMIT KUMARAMIT KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆChatGPT Prompts That Will Change Your Life Before 2025
1. Use the 80/20 principle to learn faster
Prompt: "I want to learn about [insert topic]. Identify and share the most important 20% of learnings from this topic that will help me understand 80% of it."
2. Learn and develop any new skill
Prompt: "I want to learn / get better at [insert desired skill]. I am a complete beginner. Create a 30-day learning plan that will help a beginner like me learn and improve this skill."
3. Summarize long documents and articles
Prompt: "Summarize the text below and give me a list of bullet points with key insights and the most important facts." [Insert text]
4. Train ChatGPT to generate prompts for you
Prompt: "You are an AI designed to help [insert profession]. Generate a list of the 10 best prompts for yourself. The prompts should be about [insert topic]."
5. Master any new skill
Prompt: "I have 3 free days a week and 2 months. Design a crash study plan to master [insert desired skill]."
6. Simplify complex information
Prompt: "Break down [insert topic] into smaller, easier-to-understand parts. Use analogies and real-life examples to simplify the concept and make it more relatable."
Save this now to unlock the power of ChatGPT before 2025
Ref: Vikas SinghVikas Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1. Use the 80/20 principle to learn faster
Prompt: "I want to learn about [insert topic]. Identify and share the most important 20% of learnings from this topic that will help me understand 80% of it."
2. Learn and develop any new skill
Prompt: "I want to learn / get better at [insert desired skill]. I am a complete beginner. Create a 30-day learning plan that will help a beginner like me learn and improve this skill."
3. Summarize long documents and articles
Prompt: "Summarize the text below and give me a list of bullet points with key insights and the most important facts." [Insert text]
4. Train ChatGPT to generate prompts for you
Prompt: "You are an AI designed to help [insert profession]. Generate a list of the 10 best prompts for yourself. The prompts should be about [insert topic]."
5. Master any new skill
Prompt: "I have 3 free days a week and 2 months. Design a crash study plan to master [insert desired skill]."
6. Simplify complex information
Prompt: "Break down [insert topic] into smaller, easier-to-understand parts. Use analogies and real-life examples to simplify the concept and make it more relatable."
Save this now to unlock the power of ChatGPT before 2025
Ref: Vikas SinghVikas Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆP11-Malware Development for Red Teamers.
Structure of a Portable Executable (PE) file
-----
MS-DOS Header
Located at the very beginning of the PE file, this header ensures backward compatibility with MS-DOS systems. It starts with the signature "MZ" (hexadecimal 4D5A) to indicate that the file is an executable. The header also includes metadata and, most importantly, a pointer (at the e_lfanew field) to the location of the PE signature, which marks the start of the Windows-specific portion of the file.
-
MS-DOS Stub
Following the MS-DOS Header is a small program, known as the DOS Stub, that displays a message if the file is run in an MS-DOS environment. Typically, this message is: "This program cannot be run in DOS mode." While it serves no purpose on modern Windows systems, it remains in the file for compatibility reasons.
-
PE Signature
This marks the beginning of the Portable Executable (PE) format. The signature is always PE\0\0 (hexadecimal 50 45 00 00), signaling that the file conforms to the PE standard. This signature separates the DOS-specific data from the Windows-specific data.
-
File Header
Following the PE Signature, the File Header contains critical information about the executable. This includes details like the target machine type (e.g., x86 or x64), the number of sections, the timestamp of file creation, and flags indicating the file's characteristics. It acts as a roadmap for understanding the executable's overall structure.
-
Optional Header
Despite its name, this header is mandatory for executable files. It provides essential details such as the entry point (the starting address for execution), the image base (preferred memory location), and sizes of various segments. This header bridges the gap between the high-level structure of the file and its low-level memory layout.
-
Section Headers (PE Sections)
These headers define the various sections of the executable, such as .text (code), .data (initialized data), and .rdata (read-only data). Each section header specifies attributes like the section's size, location in memory, and access permissions. These sections contain the actual content of the program, including its instructions, data, and resources.
Ref: Mohit SoniMohit Soni
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Structure of a Portable Executable (PE) file
-----
MS-DOS Header
Located at the very beginning of the PE file, this header ensures backward compatibility with MS-DOS systems. It starts with the signature "MZ" (hexadecimal 4D5A) to indicate that the file is an executable. The header also includes metadata and, most importantly, a pointer (at the e_lfanew field) to the location of the PE signature, which marks the start of the Windows-specific portion of the file.
-
MS-DOS Stub
Following the MS-DOS Header is a small program, known as the DOS Stub, that displays a message if the file is run in an MS-DOS environment. Typically, this message is: "This program cannot be run in DOS mode." While it serves no purpose on modern Windows systems, it remains in the file for compatibility reasons.
-
PE Signature
This marks the beginning of the Portable Executable (PE) format. The signature is always PE\0\0 (hexadecimal 50 45 00 00), signaling that the file conforms to the PE standard. This signature separates the DOS-specific data from the Windows-specific data.
-
File Header
Following the PE Signature, the File Header contains critical information about the executable. This includes details like the target machine type (e.g., x86 or x64), the number of sections, the timestamp of file creation, and flags indicating the file's characteristics. It acts as a roadmap for understanding the executable's overall structure.
-
Optional Header
Despite its name, this header is mandatory for executable files. It provides essential details such as the entry point (the starting address for execution), the image base (preferred memory location), and sizes of various segments. This header bridges the gap between the high-level structure of the file and its low-level memory layout.
-
Section Headers (PE Sections)
These headers define the various sections of the executable, such as .text (code), .data (initialized data), and .rdata (read-only data). Each section header specifies attributes like the section's size, location in memory, and access permissions. These sections contain the actual content of the program, including its instructions, data, and resources.
Ref: Mohit SoniMohit Soni
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆDNS Record Types You Should Know!
Here are the 8 most commonly used DNS Record Types.
1 - A (Address) Record
Maps a domain name to an IPv4 address. It is one of the most essential records for translating human-readable domain names into IP addresses.
2 - CNAME (Canonical Name) Record
Used to alias one domain name to another. Often used for subdomains, pointing them to the main domain while keeping the actual domain name hidden.
3 - AAAA Record
Similar to an A record but maps a domain name to an IPv6 address. They are used for websites and services that support the IPv6 protocol.
4 - PTR Record
Provides reverse DNS lookup, mapping an IP address back to a domain name. It is commonly used in verifying the authenticity of a server.
5 - MX Record
Directs email traffic to the correct mail server.
6 - NS (Name Server) Record
Specifies the authoritative DNS servers for the domain. These records help direct queries to the correct DNS servers for further lookups.
7 - SRV (Service) Record
SRV record specifies a host and port for specific services such as VoIP. They are used in conjunction with A records.
8 - TXT (Text) Record
Allows the administrator to add human-readable text to the DNS records. It is used to include verification records, like SPF, for email security.
Over to you: Which other DNS Record Type have you seen?
Ref: Alex Xu
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Here are the 8 most commonly used DNS Record Types.
1 - A (Address) Record
Maps a domain name to an IPv4 address. It is one of the most essential records for translating human-readable domain names into IP addresses.
2 - CNAME (Canonical Name) Record
Used to alias one domain name to another. Often used for subdomains, pointing them to the main domain while keeping the actual domain name hidden.
3 - AAAA Record
Similar to an A record but maps a domain name to an IPv6 address. They are used for websites and services that support the IPv6 protocol.
4 - PTR Record
Provides reverse DNS lookup, mapping an IP address back to a domain name. It is commonly used in verifying the authenticity of a server.
5 - MX Record
Directs email traffic to the correct mail server.
6 - NS (Name Server) Record
Specifies the authoritative DNS servers for the domain. These records help direct queries to the correct DNS servers for further lookups.
7 - SRV (Service) Record
SRV record specifies a host and port for specific services such as VoIP. They are used in conjunction with A records.
8 - TXT (Text) Record
Allows the administrator to add human-readable text to the DNS records. It is used to include verification records, like SPF, for email security.
Over to you: Which other DNS Record Type have you seen?
Ref: Alex Xu
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆChatgpt Hack:
Official Repo of ChatGPT "DAN" (and other "Jailbreaks"):
https://github.com/0xk1h0/ChatGPT_DAN
Official Repo of ChatGPT "DAN" (and other "Jailbreaks"):
https://github.com/0xk1h0/ChatGPT_DAN
GitHub
GitHub - 0xk1h0/ChatGPT_DAN: ChatGPT DAN, Jailbreaks prompt
ChatGPT DAN, Jailbreaks prompt. Contribute to 0xk1h0/ChatGPT_DAN development by creating an account on GitHub.
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWhat is Honeypot: Simplified
Follow Santosh Nandakumar for daily simplified infosec learnings.
A honeypot is a security mechanism designed to detect, deflect, or study hacking attempts by acting as a decoy system. It looks like a legitimate target but is isolated from the actual network to gather intelligence on attackers.
Example
Imagine youโre protecting a house (your network) from burglars. You set up a fake house nearby, filled with dummy valuables. Burglars are attracted to this fake house, thinking itโs the real one. You monitor their actions to learn their techniques and better secure your actual house.
Technical Example
You deploy a honeypot server within your corporate network that mimics a database server. It contains no real data but appears authentic to attackers. When an attacker tries to access it, their activities (such as IP, methods, and tools) are logged for analysis.
Types of Honeypots
1. Production Honeypot
Used to improve overall security by distracting attackers from real systems.
Example: A fake customer login page for a banking website.
2. Research Honeypot
Used for studying attack methods and gathering intelligence.
Example: A honeypot server that simulates IoT devices to study botnet attacks.
Usage
- Intrusion Detection: Identify unauthorized access attempts.
- Threat Intelligence: Understand attackers' tools, techniques, and goals.
- Deception Strategy: Divert attackers away from real resources.
- Vulnerability Testing: Study how attackers exploit weaknesses.
Benefits
1. Early Threat Detection: Identifies threats before they reach critical systems.
2. Data Collection: Offers valuable insights into attack patterns and behaviors.
3. Improved Defense: Helps in identifying security gaps and improving defenses.
4. Resource Efficiency: Reduces the workload on actual systems by diverting attacks.
5. Training Ground: Useful for security teams to practice handling real-world threats.
Limitations
1. Limited Scope: Cannot detect attacks on systems outside the honeypot.
2. Risk of Exploitation: If not properly isolated, attackers could use the honeypot to attack real systems.
3. Resource Intensive: Requires setup, monitoring, and maintenance.
Ref: Santosh Nandakumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Follow Santosh Nandakumar for daily simplified infosec learnings.
A honeypot is a security mechanism designed to detect, deflect, or study hacking attempts by acting as a decoy system. It looks like a legitimate target but is isolated from the actual network to gather intelligence on attackers.
Example
Imagine youโre protecting a house (your network) from burglars. You set up a fake house nearby, filled with dummy valuables. Burglars are attracted to this fake house, thinking itโs the real one. You monitor their actions to learn their techniques and better secure your actual house.
Technical Example
You deploy a honeypot server within your corporate network that mimics a database server. It contains no real data but appears authentic to attackers. When an attacker tries to access it, their activities (such as IP, methods, and tools) are logged for analysis.
Types of Honeypots
1. Production Honeypot
Used to improve overall security by distracting attackers from real systems.
Example: A fake customer login page for a banking website.
2. Research Honeypot
Used for studying attack methods and gathering intelligence.
Example: A honeypot server that simulates IoT devices to study botnet attacks.
Usage
- Intrusion Detection: Identify unauthorized access attempts.
- Threat Intelligence: Understand attackers' tools, techniques, and goals.
- Deception Strategy: Divert attackers away from real resources.
- Vulnerability Testing: Study how attackers exploit weaknesses.
Benefits
1. Early Threat Detection: Identifies threats before they reach critical systems.
2. Data Collection: Offers valuable insights into attack patterns and behaviors.
3. Improved Defense: Helps in identifying security gaps and improving defenses.
4. Resource Efficiency: Reduces the workload on actual systems by diverting attacks.
5. Training Ground: Useful for security teams to practice handling real-world threats.
Limitations
1. Limited Scope: Cannot detect attacks on systems outside the honeypot.
2. Risk of Exploitation: If not properly isolated, attackers could use the honeypot to attack real systems.
3. Resource Intensive: Requires setup, monitoring, and maintenance.
Ref: Santosh Nandakumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆAI-SOC. Radiant Security AI.
I have had many conversations (and still have) about Security for AI, especially about how AI-SOC can affect and help the SOC team and processes. At the same time, We have been (xTriage) running Radiant Security AI as AI-SOC (and more) for over a year, and the results arrived on time with HUGH successes!
During the AI-SOC journey with Radiant Security AI, we found many advantages about it. Below are some of them (in a nutshell):
1๏ธโฃ Proactive Threat Hunting: AI-SOC leverages real-time data analysis and threat intelligence to proactively detect emerging threats, even before they appear in known threat databases.
2๏ธโฃ Precision in Incident Detection: AI models analyze massive datasets and correlate events across multiple layers (network, endpoints, cloud, identities), reducing detection blind spots.
3๏ธโฃ Scalability: AI-SOC can handle the massive influx of security alerts and scale effortlessly with an organization's growth without requiring linear increases in human resources.
4๏ธโฃ Behavioral Anomaly Detection: AI identifies subtle deviations from normal behavior patterns that traditional systems often overlook, ensuring early detection of insider threats and zero-day exploits.
5๏ธโฃ Hyperautomation: Combining AI with SOAR platforms enables faster and smarter incident response. Automated workflows triage and contain incidents without waiting for human intervention.
6๏ธโฃ Continuous Learning and Adaptation: AI algorithms evolve with each new threat encountered, continuously improving their accuracy and relevance in detecting sophisticated attacks.
7๏ธโฃ Enhanced Collaboration: AI-SOC tools facilitate collaboration across security tiers (T1-T3), presenting data and insights in clear, actionable formats tailored to the expertise level of the analyst.
8๏ธโฃ Integrated Multi-Vendor Ecosystem: With support for seamless integration into existing ecosystems (e.g., XDR tools, SIEMs, SOAR), AI-SOC ensures minimal workflow disruption.
9๏ธโฃ Reduction in False Positives: By understanding context and correlating events, AI dramatically reduces false positives, allowing analysts to focus on genuine threats.
๐ Cost Efficiency: By automating repetitive tasks and reducing the need for manual intervention, AI-SOC optimizes resource utilization and lowers the overall cost of operations.
In the end, T1/T2 is not chasing after massive FPs or useless alerts - They are now doing advanced tasks.
Ref: Elli Shlomo
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
I have had many conversations (and still have) about Security for AI, especially about how AI-SOC can affect and help the SOC team and processes. At the same time, We have been (xTriage) running Radiant Security AI as AI-SOC (and more) for over a year, and the results arrived on time with HUGH successes!
During the AI-SOC journey with Radiant Security AI, we found many advantages about it. Below are some of them (in a nutshell):
1๏ธโฃ Proactive Threat Hunting: AI-SOC leverages real-time data analysis and threat intelligence to proactively detect emerging threats, even before they appear in known threat databases.
2๏ธโฃ Precision in Incident Detection: AI models analyze massive datasets and correlate events across multiple layers (network, endpoints, cloud, identities), reducing detection blind spots.
3๏ธโฃ Scalability: AI-SOC can handle the massive influx of security alerts and scale effortlessly with an organization's growth without requiring linear increases in human resources.
4๏ธโฃ Behavioral Anomaly Detection: AI identifies subtle deviations from normal behavior patterns that traditional systems often overlook, ensuring early detection of insider threats and zero-day exploits.
5๏ธโฃ Hyperautomation: Combining AI with SOAR platforms enables faster and smarter incident response. Automated workflows triage and contain incidents without waiting for human intervention.
6๏ธโฃ Continuous Learning and Adaptation: AI algorithms evolve with each new threat encountered, continuously improving their accuracy and relevance in detecting sophisticated attacks.
7๏ธโฃ Enhanced Collaboration: AI-SOC tools facilitate collaboration across security tiers (T1-T3), presenting data and insights in clear, actionable formats tailored to the expertise level of the analyst.
8๏ธโฃ Integrated Multi-Vendor Ecosystem: With support for seamless integration into existing ecosystems (e.g., XDR tools, SIEMs, SOAR), AI-SOC ensures minimal workflow disruption.
9๏ธโฃ Reduction in False Positives: By understanding context and correlating events, AI dramatically reduces false positives, allowing analysts to focus on genuine threats.
๐ Cost Efficiency: By automating repetitive tasks and reducing the need for manual intervention, AI-SOC optimizes resource utilization and lowers the overall cost of operations.
In the end, T1/T2 is not chasing after massive FPs or useless alerts - They are now doing advanced tasks.
Ref: Elli Shlomo
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆAnother Red Team Pack:
๐๐๐ ๐๐๐๐ฆ ๐๐จ๐จ๐ฅ๐ฌ ๐ฅ
๐ด RECONNAISSANCE:
- RustScan ==> https://lnkd.in/ebvRfBNy
- NmapAutomator ==> https://lnkd.in/gu5wxzf6
- AutoRecon ==> https://lnkd.in/g3DeG6YT
- Amass ==> https://lnkd.in/e7V569N5
- CloudEnum ==> https://lnkd.in/ePHDeGZv
- Recon-NG ==> https://lnkd.in/edwaXFjS
- AttackSurfaceMapper ==> https://lnkd.in/ebbcj6Rm
- DNSDumpster ==> https://dnsdumpster.com/
๐ด INITIAL ACCESS:
- SprayingToolKit ==> https://lnkd.in/eBSAPz5z
- o365Recon ==> https://lnkd.in/eJwCx-Ga
- Psudohash ==> https://lnkd.in/gcaxV6fR
- CredMaster ==> https://lnkd.in/gtMEDVuS
- DomainPasswordSpray ==> https://lnkd.in/guWj4TYv
- TheSprayer ==> https://lnkd.in/gZVuQYiv
- TREVORspray ==> https://lnkd.in/gHgcbjgV
๐ด DELIVERY:
- o365AttackToolKit ==> https://lnkd.in/etCCYi8y
- EvilGinx2 ==> https://lnkd.in/eRDPvwUg
- GoPhish ==> https://lnkd.in/ea26dfNg
- PwnAuth ==> https://lnkd.in/eqecM7de
- Modlishka ==> https://lnkd.in/eds-dR5C
๐ด COMMAND AND CONTROL:
- PoshC2 ==> https://lnkd.in/eqSJUDji
- Sliver ==> https://lnkd.in/ewN9Nday
- SILENTTRINITY ==> https://lnkd.in/eeZGbYMs
- Empire ==> https://lnkd.in/egAPa8gY
- AzureC2Relay ==> https://lnkd.in/efmh2t3g
- Havoc C2 ==> https://lnkd.in/gEFp2iym
- Mythic C2 ==> https://lnkd.in/gnCGwfWk
๐ด CREDENTIAL DUMPING:
- MimiKatz ==> https://lnkd.in/etEGfvJK
- HekaTomb ==> https://lnkd.in/eJx5Ugu5
- SharpLAPS ==> https://lnkd.in/eA28n9FT
- Net-GPPPassword ==> https://lnkd.in/e3CTez5A
- PyPyKatz ==> https://lnkd.in/eeb5b6Tz
๐ด PRIVILEGE ESCALATION:
- SharpUp ==> https://lnkd.in/etR2Pe_n
- MultiPotato ==> https://lnkd.in/eq53PXcJ
- PEASS ==> https://lnkd.in/eWA66akh
- Watson ==> https://lnkd.in/eZfYMSMX
- Bat-Potato ==> https://lnkd.in/gjziyG8q
๐ด DEFENSE EVASION:
- Villain ==> https://lnkd.in/gquyGFm5
- EDRSandBlast ==> https://lnkd.in/e8g8zYFT
- SPAWN - Cobalt Strike BOF ==> https://lnkd.in/e223PbqZ
- NetLoader ==> https://lnkd.in/ef5wCD4y
- KillDefenderBOF ==> https://lnkd.in/eVd54HUp
- ThreatCheck ==> https://lnkd.in/eHvSPakR
- Freeze ==> https://lnkd.in/eNUh3zCi
- GadgetToJScript ==> https://lnkd.in/egPQBBXJ
๐ด PERSISTENCE:
- SharPyShell ==> https://lnkd.in/eXm8h8Bj
- SharpStay ==> https://lnkd.in/erRbeFMj
- SharpEventPersist ==> https://lnkd.in/e_kJFNiB
๐ด LATERAL MOVEMENT:
- SCShell ==> https://lnkd.in/e256fC8B
- MoveKit ==> https://lnkd.in/eR-NUu_U
- ImPacket ==> https://lnkd.in/euG4hTTs
๐ด EXFILTRATION:
- SharpExfiltrate ==> https://lnkd.in/eGC4BKRN
- DNSExfiltrator ==> https://lnkd.in/epJ-s6gp
- Egress-Assess ==> https://lnkd.in/eXGFPQRJ
Ref: Adnan Alam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐๐๐ ๐๐๐๐ฆ ๐๐จ๐จ๐ฅ๐ฌ ๐ฅ
๐ด RECONNAISSANCE:
- RustScan ==> https://lnkd.in/ebvRfBNy
- NmapAutomator ==> https://lnkd.in/gu5wxzf6
- AutoRecon ==> https://lnkd.in/g3DeG6YT
- Amass ==> https://lnkd.in/e7V569N5
- CloudEnum ==> https://lnkd.in/ePHDeGZv
- Recon-NG ==> https://lnkd.in/edwaXFjS
- AttackSurfaceMapper ==> https://lnkd.in/ebbcj6Rm
- DNSDumpster ==> https://dnsdumpster.com/
๐ด INITIAL ACCESS:
- SprayingToolKit ==> https://lnkd.in/eBSAPz5z
- o365Recon ==> https://lnkd.in/eJwCx-Ga
- Psudohash ==> https://lnkd.in/gcaxV6fR
- CredMaster ==> https://lnkd.in/gtMEDVuS
- DomainPasswordSpray ==> https://lnkd.in/guWj4TYv
- TheSprayer ==> https://lnkd.in/gZVuQYiv
- TREVORspray ==> https://lnkd.in/gHgcbjgV
๐ด DELIVERY:
- o365AttackToolKit ==> https://lnkd.in/etCCYi8y
- EvilGinx2 ==> https://lnkd.in/eRDPvwUg
- GoPhish ==> https://lnkd.in/ea26dfNg
- PwnAuth ==> https://lnkd.in/eqecM7de
- Modlishka ==> https://lnkd.in/eds-dR5C
๐ด COMMAND AND CONTROL:
- PoshC2 ==> https://lnkd.in/eqSJUDji
- Sliver ==> https://lnkd.in/ewN9Nday
- SILENTTRINITY ==> https://lnkd.in/eeZGbYMs
- Empire ==> https://lnkd.in/egAPa8gY
- AzureC2Relay ==> https://lnkd.in/efmh2t3g
- Havoc C2 ==> https://lnkd.in/gEFp2iym
- Mythic C2 ==> https://lnkd.in/gnCGwfWk
๐ด CREDENTIAL DUMPING:
- MimiKatz ==> https://lnkd.in/etEGfvJK
- HekaTomb ==> https://lnkd.in/eJx5Ugu5
- SharpLAPS ==> https://lnkd.in/eA28n9FT
- Net-GPPPassword ==> https://lnkd.in/e3CTez5A
- PyPyKatz ==> https://lnkd.in/eeb5b6Tz
๐ด PRIVILEGE ESCALATION:
- SharpUp ==> https://lnkd.in/etR2Pe_n
- MultiPotato ==> https://lnkd.in/eq53PXcJ
- PEASS ==> https://lnkd.in/eWA66akh
- Watson ==> https://lnkd.in/eZfYMSMX
- Bat-Potato ==> https://lnkd.in/gjziyG8q
๐ด DEFENSE EVASION:
- Villain ==> https://lnkd.in/gquyGFm5
- EDRSandBlast ==> https://lnkd.in/e8g8zYFT
- SPAWN - Cobalt Strike BOF ==> https://lnkd.in/e223PbqZ
- NetLoader ==> https://lnkd.in/ef5wCD4y
- KillDefenderBOF ==> https://lnkd.in/eVd54HUp
- ThreatCheck ==> https://lnkd.in/eHvSPakR
- Freeze ==> https://lnkd.in/eNUh3zCi
- GadgetToJScript ==> https://lnkd.in/egPQBBXJ
๐ด PERSISTENCE:
- SharPyShell ==> https://lnkd.in/eXm8h8Bj
- SharpStay ==> https://lnkd.in/erRbeFMj
- SharpEventPersist ==> https://lnkd.in/e_kJFNiB
๐ด LATERAL MOVEMENT:
- SCShell ==> https://lnkd.in/e256fC8B
- MoveKit ==> https://lnkd.in/eR-NUu_U
- ImPacket ==> https://lnkd.in/euG4hTTs
๐ด EXFILTRATION:
- SharpExfiltrate ==> https://lnkd.in/eGC4BKRN
- DNSExfiltrator ==> https://lnkd.in/epJ-s6gp
- Egress-Assess ==> https://lnkd.in/eXGFPQRJ
Ref: Adnan Alam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆUnderstanding the Network Protocol Stack Simplified ๐ ๏ธ
Networking is the backbone of modern communication, but the variety of protocols can feel overwhelming. Here's a clean breakdown of the Network Protocol Stack, from physical data transmission to application-level interactions:
๐ช Application Layer (L5-L7)
Where user-facing magic happens! Think web browsing, secure communication, and directory services (e.g., HTTP, TLS, DNS).
๐ฆ Transport Layer (L4)
Handles data delivery, reliable (TCP) or quick (UDP). New protocols like QUIC ensure modern needs are met.
๐ฅ Network Layer (L3)
Focuses on routing and addressing, whether through IPv4 or IPv6, with security layers like IPsec keeping it safe.
๐ฉ Data Link Layer (L2)
Close to hardware , responsible for switching, VLANs, and WiFi connectivity.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Networking is the backbone of modern communication, but the variety of protocols can feel overwhelming. Here's a clean breakdown of the Network Protocol Stack, from physical data transmission to application-level interactions:
๐ช Application Layer (L5-L7)
Where user-facing magic happens! Think web browsing, secure communication, and directory services (e.g., HTTP, TLS, DNS).
๐ฆ Transport Layer (L4)
Handles data delivery, reliable (TCP) or quick (UDP). New protocols like QUIC ensure modern needs are met.
๐ฅ Network Layer (L3)
Focuses on routing and addressing, whether through IPv4 or IPv6, with security layers like IPsec keeping it safe.
๐ฉ Data Link Layer (L2)
Close to hardware , responsible for switching, VLANs, and WiFi connectivity.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐๐ฅ๐๐ฏ๐๐ญ๐ ๐๐จ๐ฎ๐ซ ๐๐๐๐ก ๐๐จ๐ฎ๐ซ๐ง๐๐ฒ: ๐๐ฌ๐ฌ๐๐ง๐ญ๐ข๐๐ฅ ๐๐๐ฌ๐จ๐ฎ๐ซ๐๐๐ฌ ๐๐จ๐ซ ๐๐ซ๐จ๐ฐ๐ญ๐ก ๐๐ง๐ ๐๐๐ซ๐ญ๐ข๐๐ข๐๐๐ญ๐ข๐จ๐ง ๐๐ฎ๐๐๐๐ฌ๐ฌ
Whether youโre looking to break into tech, grow your expertise, or prepare for certifications, use these resources to help you level up:
๐ฏ Microsoft Learn: https://lnkd.in/ge973G3j
Explore interactive, self-paced modules on Azure, Microsoft 365, Power Platform, and more.
๐ฏ Microsoft Virtual Training Days: https://lnkd.in/g2B_2Yq3
Free, instructor-led events with opportunities to earn free certification exam vouchers!
๐ฏ GitHub Learning Lab: https://lab.github.com/
Dive into Git basics, open-source contributions, and DevOps workflows.
๐ฏ Microsoft Educator Center: https://lnkd.in/gFcX5xdm
Focused on education technology, this resource is excellent for educators learning Teams and Office 365 tools.
๐ฏ Azure DevOps Labs: https://lnkd.in/gi4uekjB
Get practical experience with CI/CD pipelines, infrastructure as code, and governanceโall for free!
๐ฏ AI for Good & Responsible AI Training: https://lnkd.in/gtXfexiY
Learn about cutting-edge AI applications and ethical AI practices.
Ref: Mohamad Hamadi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Whether youโre looking to break into tech, grow your expertise, or prepare for certifications, use these resources to help you level up:
๐ฏ Microsoft Learn: https://lnkd.in/ge973G3j
Explore interactive, self-paced modules on Azure, Microsoft 365, Power Platform, and more.
๐ฏ Microsoft Virtual Training Days: https://lnkd.in/g2B_2Yq3
Free, instructor-led events with opportunities to earn free certification exam vouchers!
๐ฏ GitHub Learning Lab: https://lab.github.com/
Dive into Git basics, open-source contributions, and DevOps workflows.
๐ฏ Microsoft Educator Center: https://lnkd.in/gFcX5xdm
Focused on education technology, this resource is excellent for educators learning Teams and Office 365 tools.
๐ฏ Azure DevOps Labs: https://lnkd.in/gi4uekjB
Get practical experience with CI/CD pipelines, infrastructure as code, and governanceโall for free!
๐ฏ AI for Good & Responsible AI Training: https://lnkd.in/gtXfexiY
Learn about cutting-edge AI applications and ethical AI practices.
Ref: Mohamad Hamadi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐๐จ๐ฐ ๐๐ญ๐ญ๐๐๐ค๐๐ซ๐ฌ ๐๐๐๐ค ๐๐/๐๐ ๐๐ข๐ฉ๐๐ฅ๐ข๐ง๐๐ฌ ๐
I recently watched one of DEFCON's talk of this year "Your CI CD Pipeline Is Vulnerable, But It's Not Your Fault" by Elad Pticha, Oreen Livni and was really impressed by the attack vector (link in comments)
๐๐๐ญ'๐ฌ ๐ฌ๐๐ ๐ก๐จ๐ฐ ๐ข๐ญ ๐ฐ๐จ๐ซ๐ค๐ฌ
Github workflows are part of the CI/CD (Continous Integration/Continous Deployment) ecosystem that lets developers automate their workflow
For example: once a commit is made to the repo -> the code is scanned with a tool -> if the tests pass -> code is pushed to test/production
Now the interesting part is that (if the repo maintainer uses input that you control) inside the workflow, this can lead to command injection in the pipeline
๐๐ก๐ข๐๐ก ๐ฆ๐๐๐ง๐ฌ ๐ฒ๐จ๐ฎ ๐ฆ๐๐ฒ ๐๐ ๐๐๐ฅ๐ ๐ญ๐จ ๐ญ๐๐ค๐ ๐จ๐ฏ๐๐ซ ๐ญ๐ก๐ ๐ซ๐๐ฉ๐จ
In the example bellow, the pipeline uses the title of an issue as part of a bash echo command
That means anyone can create a issue named $(๐ฐ๐ก๐จ๐๐ฆ๐ข) and execute commands in the CI/CD
If you can do that -> you can abuse the command injection to steal the repo's Github token, read secrets or push malicious code
Ref: Andrei Agape
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
I recently watched one of DEFCON's talk of this year "Your CI CD Pipeline Is Vulnerable, But It's Not Your Fault" by Elad Pticha, Oreen Livni and was really impressed by the attack vector (link in comments)
๐๐๐ญ'๐ฌ ๐ฌ๐๐ ๐ก๐จ๐ฐ ๐ข๐ญ ๐ฐ๐จ๐ซ๐ค๐ฌ
Github workflows are part of the CI/CD (Continous Integration/Continous Deployment) ecosystem that lets developers automate their workflow
For example: once a commit is made to the repo -> the code is scanned with a tool -> if the tests pass -> code is pushed to test/production
Now the interesting part is that (if the repo maintainer uses input that you control) inside the workflow, this can lead to command injection in the pipeline
๐๐ก๐ข๐๐ก ๐ฆ๐๐๐ง๐ฌ ๐ฒ๐จ๐ฎ ๐ฆ๐๐ฒ ๐๐ ๐๐๐ฅ๐ ๐ญ๐จ ๐ญ๐๐ค๐ ๐จ๐ฏ๐๐ซ ๐ญ๐ก๐ ๐ซ๐๐ฉ๐จ
In the example bellow, the pipeline uses the title of an issue as part of a bash echo command
That means anyone can create a issue named $(๐ฐ๐ก๐จ๐๐ฆ๐ข) and execute commands in the CI/CD
If you can do that -> you can abuse the command injection to steal the repo's Github token, read secrets or push malicious code
Ref: Andrei Agape
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ