LabCyberIntel's profile picture.

Lab Cyber Intel

@LabCyberIntel

You might like
Lab Cyber Intel reposted

Here I bypassed Defender AV by making: .eyb files as .exe .faq files as .dll I'm sure this can work on other security solutions and for many other blacklisted techniques. (1/2)

mrd0x's tweet image. Here I bypassed Defender AV by making:
.eyb files as .exe 
.faq files as .dll

I'm sure this can work on other security solutions and for many other blacklisted techniques. (1/2)

Lab Cyber Intel reposted

AD Pentest mindmap upgrade : Full version: github.com/Orange-Cyberde… xmind version (slow, the map is big) : xmind.net/m/5dypm8/ Fell free to tell me what is missing !

M4yFly's tweet image. AD Pentest mindmap upgrade :
Full version: github.com/Orange-Cyberde… 

xmind version (slow, the map is big) :
xmind.net/m/5dypm8/

Fell free to tell me what is missing !

Lab Cyber Intel reposted

Fix on a registry key for #printnightmare

gentilkiwi's tweet image. Fix on a registry key for #printnightmare

Lab Cyber Intel reposted

Very (very) soon in #mimikatz 🥝 Client RDP passwords/PIN in MSTSC process, decrypted. Without previous injection/hook in process, of course😉 Especially useful on jump servers🤪 ~ Can also be used to debug some internal properties ~

gentilkiwi's tweet image. Very (very) soon in #mimikatz 🥝
Client RDP passwords/PIN in MSTSC process, decrypted.

Without previous injection/hook in process, of course😉

Especially useful on jump servers🤪

~ Can also be used to debug some internal properties ~
gentilkiwi's tweet image. Very (very) soon in #mimikatz 🥝
Client RDP passwords/PIN in MSTSC process, decrypted.

Without previous injection/hook in process, of course😉

Especially useful on jump servers🤪

~ Can also be used to debug some internal properties ~

Lab Cyber Intel reposted

Sharing a partially redacted PEM online is the same as sharing the PEM. In this blog post, we show that with partial exposure of a PEM, private data can be extracted to recover the full private key. blog.cryptohack.org/twitter-secrets

This morning, I began another #pentest for a client. After some google-fu dorking combine with the major search engines, I found the id_rsa key that gave me access to the server and a bunch of others 😬😬 another mistake under their radar...

_SaxX_'s tweet image. This morning, I began another #pentest for a client. After some google-fu dorking combine with the major search engines, I found the id_rsa key that gave me access to the server and a bunch of others 😬😬

another mistake under their radar...


Lab Cyber Intel reposted

Quick (and dirty) script to extract locally some useful information from your #bloodhound dump #windows #pentest github.com/kaluche/bloodh…

kaluche_'s tweet image. Quick (and dirty) script to extract locally some useful information from your #bloodhound dump #windows #pentest github.com/kaluche/bloodh…

Lab Cyber Intel reposted

Win Brute Logon - local password brute force #infosec #pentest github.com/DarkCoderSc/wi…

CyberWarship's tweet image. Win Brute Logon

- local password brute force 

#infosec #pentest 
github.com/DarkCoderSc/wi…

Lab Cyber Intel reposted

⚠️Alerte CERT-FR⚠️ Samba configuré comme contrôleur de domaine est également vulnérable à CVE-2020-1472 CERTFR-2020-ALE-021 : Vulnérabilité dans Samba (18 septembre 2020) cert.ssi.gouv.fr/alerte/CERTFR-…


Lab Cyber Intel reposted

⚠️Alerte CERT-FR⚠️ CERTFR-2020-ALE-020 : Vulnérabilité dans Microsoft Netlogon (15 septembre 2020) cert.ssi.gouv.fr/alerte/CERTFR-…


Lab Cyber Intel reposted

#Podcast #Cybersécurité Épisode #285 : 10 "Quick Wins" pour le RSSI nolimitsecu.fr/10-quick-wins-…


Lab Cyber Intel reposted

#Podcast #Cybersécurité Épisode #260 consacré à la sécurité du télétravail et des accès distants nolimitsecu.fr/teletravail-et…


Lab Cyber Intel reposted

If you have played around with Silver Tickets or Kerberoasting in Active Directory, you've probably heard about SPN. But what is it exactly, how is it used? This post is a small reminder to prepare next article about kerberoasting. 🙃 en.hackndo.com/service-princi…


Lab Cyber Intel reposted

#Podcast #Cybersécurité Épisode #257 consacré à l'état de l'art en matière de réponse aux incidents, avec Serge Lefranc nolimitsecu.fr/etat-de-l-art-…


Lab Cyber Intel reposted

#BloodHound 3.0 is here! BloodHound: bit.ly/GetBloodHound Blog: bit.ly/3bu3chl Webinar deck: bit.ly/3837gTx Webinar recording coming soon #BloodHound 3.0 shirt: (all profits go to @MDAorg) customink.com/fundraising/th…

_wald0's tweet image. #BloodHound 3.0 is here!

BloodHound: bit.ly/GetBloodHound
Blog: bit.ly/3bu3chl
Webinar deck: bit.ly/3837gTx
Webinar recording coming soon

#BloodHound 3.0 shirt: (all profits go to @MDAorg)

customink.com/fundraising/th…

Lab Cyber Intel reposted

#Podcast #Cybersécurité Épisode #253 consacré à la vulnérabilité CVE-2020-0601 #CurveBall nolimitsecu.fr/curveball/


Lab Cyber Intel reposted

Exploit Tutorial: The Elusive Egghunter #infosec #pentest #exploitDev primalsecurity.net/0x8-exploit-tu…


Lab Cyber Intel reposted

lsassy 1.0.0 is finally out ! 🔸 Remotely dump #lsass **with built-in Windows tools only**, procdump is no longer necessary 🔸 Remotely parse lsass dumps to extract credentials 🔸 Link to #Bloodhound to detect compromised users with path to Domain Admin github.com/Hackndo/lsassy

HackAndDo's tweet image. lsassy 1.0.0 is finally out !
🔸 Remotely dump #lsass **with built-in Windows tools only**, procdump is no longer necessary
🔸 Remotely parse lsass dumps to extract credentials
🔸 Link to #Bloodhound to detect compromised users with path to Domain Admin
github.com/Hackndo/lsassy

United States Trends

You might like

Loading...

Something went wrong.


Something went wrong.