π [ Cx01N_, Cx01N ]
This is great!
https://t.co/xkvlT03Wf1
π https://github.com/NARKOZ/hacker-scripts
π₯ [ tweet ]
This is great!
https://t.co/xkvlT03Wf1
π https://github.com/NARKOZ/hacker-scripts
π₯ [ tweet ]
π [ _nwodtuhs, Charlie Bromberg (Shutdown) ]
After 4 months of testing/peer-review and the PR being in draft, dacledit is now ready for official review and merge in Impacket πͺ This script can be used to read, write, remove, backup, restore ACEs in an object's DACL, see you soon when merged π
https://t.co/nQGZy1dnbR
π https://github.com/SecureAuthCorp/impacket/pull/1291
π₯ [ tweet ]
After 4 months of testing/peer-review and the PR being in draft, dacledit is now ready for official review and merge in Impacket πͺ This script can be used to read, write, remove, backup, restore ACEs in an object's DACL, see you soon when merged π
https://t.co/nQGZy1dnbR
π https://github.com/SecureAuthCorp/impacket/pull/1291
π₯ [ tweet ]
π [ lpha3ch0, Steve Campbell ]
My latest blog post, Pivoting for Pentesters https://t.co/9N1gxtdJXn #infosec #pentest #redteam
π https://www.stevencampbell.info/Pivoting-for-pentesters/
π₯ [ tweet ]
My latest blog post, Pivoting for Pentesters https://t.co/9N1gxtdJXn #infosec #pentest #redteam
π https://www.stevencampbell.info/Pivoting-for-pentesters/
π₯ [ tweet ]
π [ ReconOne_, ReconOne ]
Shodan Dork in Manual mode - Part 1
Now that you all have Shodan membership it's time to try Shodan Dorks ππ
Credits: @securitytrails
#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity
π₯ [ tweet ]
Shodan Dork in Manual mode - Part 1
Now that you all have Shodan membership it's time to try Shodan Dorks ππ
Credits: @securitytrails
#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity
π₯ [ tweet ]
π [ C5pider, 5pider ]
CoffeeLdr
A Beacon Object File Loader
https://t.co/vD2QlGhLov
π https://github.com/Cracked5pider/CoffeeLdr
π₯ [ tweet ]
CoffeeLdr
A Beacon Object File Loader
https://t.co/vD2QlGhLov
π https://github.com/Cracked5pider/CoffeeLdr
π₯ [ tweet ]
π [ i_bo0om, Bo0oM ]
20 years of payment processing problems
Ru: https://t.co/Xp81RFL9hQ
En: https://t.co/aDep1kdgyu
π https://bo0om.ru/20-years-of-payment-processing-problems
π https://bo0om.ru/20-years-of-payment-processing-problems-en
π₯ [ tweet ]
20 years of payment processing problems
Ru: https://t.co/Xp81RFL9hQ
En: https://t.co/aDep1kdgyu
π https://bo0om.ru/20-years-of-payment-processing-problems
π https://bo0om.ru/20-years-of-payment-processing-problems-en
π₯ [ tweet ]
π [ mpgn_x64, mpgn ]
I just merged one of the most craziest module in CrackMapExec called "hash_spider" from @hackerm00n π
With an initial admin access, it will dump lsass recursively using BloodHound to find local admins path (adminTo) to harvest more users and find new paths until DA π₯
πͺ
π₯ [ tweet ]
I just merged one of the most craziest module in CrackMapExec called "hash_spider" from @hackerm00n π
With an initial admin access, it will dump lsass recursively using BloodHound to find local admins path (adminTo) to harvest more users and find new paths until DA π₯
πͺ
π₯ [ tweet ]
π [ an0n_r0, an0n ]
elevated CVE-2022-30166 EoP to SYSTEM. the work was done by @tiraniddo, here I just modified their PoC for getting TGT dump, did some custom ticket conversion stuff then RBCD attack with the machine Kerberos TGT. works only if AllowTgtSessionKey (non-default) is enabled.
π₯ [ tweet ][ quote ]
elevated CVE-2022-30166 EoP to SYSTEM. the work was done by @tiraniddo, here I just modified their PoC for getting TGT dump, did some custom ticket conversion stuff then RBCD attack with the machine Kerberos TGT. works only if AllowTgtSessionKey (non-default) is enabled.
π₯ [ tweet ][ quote ]
π [ _RastaMouse, Rasta Mouse ]
I spent some of time I was glued to my chair with sweat to put rportfwd into SharpC2 as well.
π https://github.com/SharpC2/SharpC2/tree/dev
π₯ [ tweet ]
I spent some of time I was glued to my chair with sweat to put rportfwd into SharpC2 as well.
π https://github.com/SharpC2/SharpC2/tree/dev
π₯ [ tweet ]
π [ CoreAdvisories, CoreLabs Research ]
Get an in-depth analysis of recent #Windows #vulnerability, CVE-2022-22029> from cybersecurity expert and #exploit writer @ricnar456
https://t.co/i4nyYDiapH
π https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-22029-windows-network-file-system-vulnerability
π₯ [ tweet ]
Get an in-depth analysis of recent #Windows #vulnerability, CVE-2022-22029> from cybersecurity expert and #exploit writer @ricnar456
https://t.co/i4nyYDiapH
π https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-22029-windows-network-file-system-vulnerability
π₯ [ tweet ]
π [ HuskyHacksMK, Matt | HuskyHacks ]
Confirmed that the new Apache Spark OS Command Injection works π
CVE-2022-33891 Apache Spark Shell Command Injection Vulnerability (disc. by Kostya Kortchinsky, not me)
Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1
POC soon!
π₯ [ tweet ]
Confirmed that the new Apache Spark OS Command Injection works π
CVE-2022-33891 Apache Spark Shell Command Injection Vulnerability (disc. by Kostya Kortchinsky, not me)
Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1
POC soon!
π₯ [ tweet ]
π [ HuskyHacksMK, Matt | HuskyHacks ]
πMy Python POC for CVE-2022-33891, Apache Spark OS Command Injection Vulnerability
hacky, slapdash, just the way I like it
Can check if a target is vuln, do a quick reverse shell, and even has an "Interactive" mode!
comes with a vuln version of Spark
https://t.co/bOXMlXYmzd
π https://github.com/HuskyHacks/cve-2022-33891
π₯ [ tweet ]
πMy Python POC for CVE-2022-33891, Apache Spark OS Command Injection Vulnerability
hacky, slapdash, just the way I like it
Can check if a target is vuln, do a quick reverse shell, and even has an "Interactive" mode!
comes with a vuln version of Spark
https://t.co/bOXMlXYmzd
π https://github.com/HuskyHacks/cve-2022-33891
π₯ [ tweet ]
π [ M4yFly, Mayfly ]
GOAD exploitation part5 : sAMAccountName spoofing and printNightmare.
https://t.co/F6X1HtUhCr
π https://mayfly277.github.io/posts/GOADv2-pwning-part5/
π₯ [ tweet ]
GOAD exploitation part5 : sAMAccountName spoofing and printNightmare.
https://t.co/F6X1HtUhCr
π https://mayfly277.github.io/posts/GOADv2-pwning-part5/
π₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
π [ kalilinux, Kali Linux ]
You know about our weekly images, but did you know we now have weekly VMs? Or, did you know you can use our build scripts to automate creating your own VMs?
Check it out!
https://t.co/WKekW7dncr
π https://www.kali.org/blog/kali-vm-builder-weekly/
π₯ [ tweet ]
You know about our weekly images, but did you know we now have weekly VMs? Or, did you know you can use our build scripts to automate creating your own VMs?
Check it out!
https://t.co/WKekW7dncr
π https://www.kali.org/blog/kali-vm-builder-weekly/
π₯ [ tweet ]
π [ theluemmel, S4U2LuemmelSec ]
I am not shocked anymore :)
Confluence Questions hardcoded creds for user
CVE-2022-26138
https://t.co/2O3qt6IYee
π https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26138
π₯ [ tweet ]
I am not shocked anymore :)
Confluence Questions hardcoded creds for user
CVE-2022-26138
https://t.co/2O3qt6IYee
π https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26138
π₯ [ tweet ]
π₯2
π [ fluepke, @fluepke@chaos.social ]
Discovered by a fried of mine:
CVE-2022-26138: A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group
The password is disabled1system1user6708
π₯ [ tweet ]
Discovered by a fried of mine:
CVE-2022-26138: A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group
The password is disabled1system1user6708
π₯ [ tweet ]
π₯2