100 Red Team Projects – A Comprehensive Guide For Pentesters And Network Managers

0

Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students are learning, creating and exploiting all types of systems. The internet is not only the most common means through which people interact and chat, but also a place where they are constantly exposed to a world where anyone can...

DriverJack – Exploiting NTFS Techniques For Covert Driver Loading

0

DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques. These method bypass the registration of a Driver Service on the system by hijacking an existing service, and also spoof the image path presented in the Driver Load event. To further masquerade the presence of a vulnerable driver, the attack also abuses an Emulated Filesystem...

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

0

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs, patches, script deployments, etc. By default, these servers allow access via SMB (TCP/445) and HTTP/S (TCP/80 and/or TCP/443) and require some type of Windows authentication (i.e. NTLM). The current SCCM DP looting tools rely on the ability to browse SMB...

SHIMME – Manipulating Shim And Office For Code Injection

0

In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms. The "ShimMe" talk introduced two groundbreaking tools: the Office Injector and the Shim Injector, each designed to manipulate system processes for elevated security access. This article delves into these sophisticated techniques, offering a glimpse into their mechanisms and implications for system security. Tools from...

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

0

The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It is used by a wide variety of people, companies and organizations, both for lawful activities and for other illicit purposes. Tor has been largely used by intelligence agencies, hacking groups, criminal activities and even ordinary users who care about...

Project Apeman : A Comprehensive Guide To Graph-Based AWS Security Analysis

0

Project Apeman is an advanced tool for security professionals, designed to streamline the analysis of AWS environments using a graph-based approach. This guide offers detailed instructions on setting up and deploying Project Apeman, including system requirements, installation steps, and data ingestion. Get ready to enhance your security posture with this powerful and efficient tool. System Requirements Tested On Windows 11 Ubuntu 22 12 GB...

TCA – A Comprehensive Toolkit For Code Analysis And Quality Assurance

0

Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages. Code analysis is a technology, using lexical...

2024-PocLib : Comprehensive Vulnerability And Security Exploit Overview

0

The 2024-PocLib project serves as a crucial resource for cybersecurity enthusiasts and researchers, offering a detailed compilation of the latest vulnerabilities and security threats identified across various platforms. This article presents an exhaustive list of exploits and security loopholes, highlighting the importance of staying informed and proactive in the cybersecurity landscape. From common software vulnerabilities to critical infrastructure exploits,...

v2.4.11 – Enhancements, Fixes, And Community Growth

0

Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront. This update introduces robust GraphQL support, multi-factor authentication, and innovative versioning for notes. Explore the contributions from the community and key fixes that enhance functionality and security in this detailed release summary. What's Changed Add GraphQL support on some endpoints Add MFA...

WhenFS – Transforming Google Calendar Into A Whimsical File System

0

A novel technology that reimagines Google Calendar as a whimsical file system. This quirky tool allows you to create, read, and write files directly within your calendar, transforming it into a FUSE filesystem. Dive into the capabilities of WhenFS, from mounting shared calendars to transferring files at unprecedented speeds—all through the simplicity of your daily scheduler. WhenFS turns your Google...