This repo demonstrates how to create certificates for WinRM/WSMan client certificate authentication and how to configure Windows to setup the service side to allow those certificates for client authentication. It has some Ansible playbooks that can be used to do all the necessary steps plus some standalone scripts and background information to help you understand …
Category Archives: Cyber security
Project Horus – The Comprehensive Toolkit For Investigation Assistance
Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages advanced APIs and data compilation strategies to streamline your investigative workflow. Whether you’re a security professional or a tech enthusiast, Horus equips you with the necessary tools to elevate your analytical capabilities. Table of Contents 🚀 About Horus Horus is …
Continue reading “Project Horus – The Comprehensive Toolkit For Investigation Assistance”
CVE-2024-29824 : Exploring The Remote Code Execution Vulnerability In Ivanti EPM
In recent developments, a significant security vulnerability has emerged within Ivanti Endpoint Manager (EPM), identified as CVE-2024-29824. This critical flaw allows for remote code execution (RCE), posing a severe risk to systems running the affected software. The exploit enables attackers to execute arbitrary code on target systems, potentially leading to full system compromise. This article …
Continue reading “CVE-2024-29824 : Exploring The Remote Code Execution Vulnerability In Ivanti EPM”
Security Ninjas AppSec Training – Your Complete Guide To Mastering Application Security
This hands-on training lab consists of 10 fun real world like hacking exercises, corresponding to each of the OWASP Top 10 vulnerabilities. Hints and solutions are provided along the way. Although the backend for this is written in PHP, vulnerabilities would remain the same across all web based languages, so the training would still be …
Certiception – Reinventing Network Security With Deceptive Active Directory Certificate Services
Certiception is a honeypot for Active Directory Certificate Services (ADCS), designed to trap attackers with a realistic and attractive bait that triggers highly relevant alerts. Developed by the SRLabs Red Team, Certiception creates a vulnerable-looking certificate template in your ADCS environment, sets up restrictions to prevent exploitation, and supports in setting up effective alerting. Originally released at Troopers24, …
AMSI Bypass via VEH – Technique Using Vectored Exception Handling
A PowerShell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification. How It Works: For this technique to work, you must first inject the VEH DLL into the PowerShell process. This can be done either by injecting the DLL or …
Continue reading “AMSI Bypass via VEH – Technique Using Vectored Exception Handling”
RedELK – Essential Naming Requirements For Deployment
In the complex landscape of RedELK deployment, adhering to precise naming requirements is crucial for operational success. This article delves into the essential naming conventions necessary for a smoothly functioning RedELK setup. From FilebeatID to Redirector configurations, understand the specifics that ensure your cybersecurity infrastructure is effective and efficient. For a properly working RedELK setup …
Continue reading “RedELK – Essential Naming Requirements For Deployment”
Kdrill – Unveiling Rootkit Intrusions In Windows 64-Bit Systems
Kdrill is a tool to analyze the kernel land of Windows 64b systems (tested from Windows 7 to Windows 11). Its main objective is to assess if the kernel is compromised by a rootkit. The code is compatible with python2/3 without dependencies and can perfom checks without Microsoft symbols or Internet connectivity. For live memory/kernel …
Continue reading “Kdrill – Unveiling Rootkit Intrusions In Windows 64-Bit Systems”
APKscan – Mastering Android Security Analysis
APKs (Android Package Kits) often leak secrets due to over-reliance on security through obscurity. Developers sometimes leave sensitive information such as API keys, tokens, and credentials hidden within the code, assuming that they won’t be found easily since the code has been compiled and obfuscated. However, this approach is fundamentally flawed, and such secrets can be exposed, leading to potential security vulnerabilities. Identify …
Continue reading “APKscan – Mastering Android Security Analysis”
Akto.io – Comprehensive Security Testing And Inventory Management
Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used by security teams to maintain a continuous inventory of APIs, test APIs for vulnerabilities and find runtime issues. Akto offers coverage for all OWASP top 10 and HackerOne Top 10 categories including BOLA, authentication, SSRF, …
Continue reading “Akto.io – Comprehensive Security Testing And Inventory Management”