by frank | Jun 28, 2019 | CTF, Linux, Pwn, Windows
Two excellent web sites with a reference on how each exe can be used Windows : https://lolbas-project.github.io/ Unix : https://gtfobins.github.io/ On Unix, there is a script based on that that would help enumerate all possible way to elevate privileges. cd /tmp...
by frank | Jun 28, 2019 | CTF, Security, Windows
Reading Time: < 1 minuteNTFS allows additional attributes. ( https://en.wikipedia.org/wiki/NTFS#Alternate_data_streams_.28ADS.29 ) Under Linux : getfattr getfattr file.123 getfattr file.123 –only-values > output.bin Under Windows : dir /r streams myfile...
by frank | Jun 28, 2019 | Palo Alto, Red team, Security
Each system, has its limits.The Palo Alto on the latest version (tested on 9.0.1), is checking only up to 21 fields for a coupe of username and password in the bloom field.Normal creds form with 20 hidden INPUT before the Username & Password field. This shows the...
by frank | Jun 28, 2019 | Linux, Security
Reading Time: < 1 minuteThe following example binds local port 8834 on remote host via ssh as localhost port 8834.ssh -R 8834:localhost:8834...
by frank | Jun 28, 2019 | Debug, Misc, Security
Reading Time: < 1 minuteGui https://1.2.3.4/ng/page/p/firewall/sniffer/?vdom=myvdom en CLIconfig myvdomedit myvdomdiag sniff...
Recent Comments