Every JWT writeup online covers 2–3 attacks and stops.
I got tired of jumping between 40 blog posts, so I wrote the whole thing. All in one place.
rmrf.tips/en#infosec#appsec#bugbounty#websec#jwt
The 13-Stage Scan Pipeline Inside Defender - @HackingLZ
A complete reverse engineering breakdown of mpengine.dll — the monolithic engine behind Windows Defender. Every file scanned on a Windows machine flows through this single 14.3 MB binary.
hackinglz.github.io/defender_overv…
Thanks to Azox, it is now possible to use psexecsvc (github.com/sensepost/susi…) through a socks proxy like ntlmrelayx allowing executing system commands via a trusted service, as NT System, and evading EDR's. Also thanks to @HackAndDo for his fixes :D
Giveaway - Our instructor-led advanced bootcamps for sharpening your Red Team skills start this weekend.
Attacking and Defending Active Directory - Advanced Edition (CRTE) starts this Friday.
Advanced Windows Tradecraft - Evasion Techniques for Red Teams (CETP) starts this Saturday.
I am giving away one seat for each of the bootcamps. To participate, please Follow @nikhil_mitt and @AlteredSecurity, Like, Comment and Repost.
We will announce the random winners on Wednesday.
alteredsecurity.com/bootcamps?utm_…#RedTeam#Evasion
Releasing PrivHound — Bloodhound collector to model Windows local Privilege Escalation as a graph.
Still early — bugs and PRs welcome.
github.com/dazzyddos/Priv…
Graham Helton has just published a disclosure of a Kubernetes vulnerability that allows running arbitrary commands in any pod in a cluster using a common "read-only" RBAC permission. And this vulnerability won't be assigned a CVE, meaning Kubernetes won't receive a fix 🤷♂️
grahamhelton.com/blog/nodes-pro…
But there is a silver lining. Graham prepared a short auxiliary post that focuses specifically on the reproduction, and it's an iximiuz Labs tutorial: labs.iximiuz.com/tutorials/node… 💙
We definitely need more security researchers publishing exploit reproductions as code labs anyone can run and verify!