The CyberSec Lounge: https://disboard.org/server/join/509544906335715349
Infosec Community: https://discord.gg/bw8DzNn
Whitehat Hacking: https://discord.gg/dCu7n6J
HackTheBox: https://discord.gg/2NJt27j
function matrixRain() { | |
const canvas = document.createElement("canvas"); | |
canvas.width = window.innerWidth; | |
canvas.height = window.innerHeight; | |
canvas.style.position = "fixed"; | |
canvas.style.top = 0; | |
canvas.style.left = 0; | |
canvas.style.zIndex = -1; | |
document.body.appendChild(canvas); |
function Get-ProcessPipes{ | |
param( | |
[Parameter(Mandatory=$false)] | |
[string]$CSV, | |
[Parameter(Mandatory=$false)] | |
[switch]$All | |
) | |
Add-Type -TypeDefinition @" | |
using System; |
The CyberSec Lounge: https://disboard.org/server/join/509544906335715349
Infosec Community: https://discord.gg/bw8DzNn
Whitehat Hacking: https://discord.gg/dCu7n6J
HackTheBox: https://discord.gg/2NJt27j
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
// | |
// Run this javascript file like so | |
// | |
// node generate-nested-json.js "a" 1024 64 | |
// Where: | |
// | |
// "a" is the nested property to create | |
// 1024 is the initial max recursion | |
// 64 is the amount of times to multiple the initial max recursion. | |
// |
.cgi/ | |
.cgi/.htaccess | |
.cgi/idm/ | |
.cgi/idm/.htaccess | |
.cgi/idm/index.php | |
.cgi/idm/oauth2 | |
.cgi/idm/oauth2/authword.php | |
.cgi/idm/oauth2/context.php | |
.cgi/idm/oauth2/Email.php | |
.cgi/idm/oauth2/index.php |
In the default configuration of Active Directory, it is possible to remotely take over Workstations (Windows 7/10/11) and possibly servers (if Desktop Experience is installed) when their WebClient service is running. This is accomplished in short by;
The caveat to this is that the WebClient service does not automatically start at boot. However, if the WebClient service has been triggered to start on a workstation (for example, via some SharePoint interactions), you can remotely take over that system. In addition, there are several ways to coerce the WebClient service to start remotely which I cover in a section below.
This is an example to demo how you generate the RSA key pair from server side(.NetCore 3.1) and pass the public key to the client(Browser) for encrypting the data that <= 245 bytes.
RSA-2048 can only support to encrypt up to 245 bytes data.
using var rsaProvider = new RSACng();
// spki is used for browser side encryption
var spki = Convert.ToBase64String(rsaProvider.ExportSubjectPublicKeyInfo());
var encodedPrivateKey = Convert.ToBase64String(rsaProvider.ExportPkcs8PrivateKey());