A full decompilation and automatic #security analysis of all contracts on the #Ethereum #blockchain #informatique
Dozens of #US hospitals and clinics in West Virginia and Ohio are canceling surgeries and diverting ambulances following a #ransomware attack that has knocked out staff access to IT systems across virtually all of their operations #health #santé
https://arstechnica.com/gadgets/2021/08/hospitals-hamstrung-by-ransomware-are-turning-away-patients/
Museum of Portable Sound - Ecsite 2021 : The Power of SoundThe First Recording of a Human Voice ( Phonautogram by Édouard-Léon Scott de Martinville, Paris, #France, 1860), Capt'n Crunch (2600 Hz), .. #histoire #culture #informatique
ssh-audit is a tool for #ssh server & client configuration auditing #linux #informatique
An #Amiga, Deluxe Paint and a mouse. From the late 80s to the early 90s, these 3 tools were at the core of numerous graphic designers' workstations in the West. It took years for the Japanese industry to start adopting commercial engines #informatique #gaming
https://vgdensetsu.tumblr.com/post/179656817318/designing-2d-graphics-in-japan-from-the-late-70s
PrivescCheck now enumerates volume shadow copies and checks whether SAM/SYSTEM/SECURITY files are readable as a low-priv user. This tool help security consultants identify potential weaknesses on #Microsoft #Windows machines during penetration tests and Workstation/VDI audits #informatique
targetedKerberoast is a #Python script that can, like many others (e.g. GetUserSPNs.py), print « kerberoast » hashes for user accounts that have a SPN set. #informatique
#Phishing - #Microsoft #Windows leaking NetNTLM hashes #threats #informatique
(CVE-2020-9273) PoC - ProFTPd Post-Auth Use-After-Free leading to RCE #vuln #informatique
https://github.com/lockedbyte/CVE-Exploits/tree/master/CVE-2020-9273
Reko is a decompiler for machine code binaries #informatique
TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot and keylog callback data, which allows you to tweak the fix for the « HotCobalt » vulnerability #microsoft #windows #vuln
Charlie Bromberg's mindmap for common attacks operated on Active Directory authentication protocols (NTLM, Kerberos) : Pass-the-hash, Pass-the-key, Pass-the-ticket, Pass-the-cache, Overpass-the-hash, Golden ticket, Silver ticket, ASPREProast, Kerberoast, relayed captured,.. #microsoft #windows #vuln
Example of COM hijacking using a proxy DLL #microsoft #windows
Certify is a tool to enumerate and abuse misconfigurations in Active Directory Certificate Services #microsoft #windows #informatique
ForgeCert is a tool to forge certificates for arbitrary users capable of authentication to Active Directory : Forging Certificates with Stolen CA Certificates - DPERSIST1 #microsoft #windows #informatique
Fingerprinting #Microsoft #Windows versions, AV, EDR, software agents, #wireless cards over the #network-all without authentication #threats #informatique
Spoofing file extensions using #Google Drive and #Microsoft OneDrive #cloud #threats
https://blog.thecybersecuritytutor.com/spoofing-file-extensions-using-gdrive-and-onedrive/
How to Hack APIs in 2021 with Postman API Platform (postman.com
) #informatique #devops
https://labs.detectify.com/2021/08/10/how-to-hack-apis-in-2021/
ProxyOrcale, which focuses on the Padding Orcale Attack, and ProxyShell, which exploits a Path Confusion vulnerability to achieve arbitrary file write and eventually code execution. This blog assumes readers have read Orange Tsai's slide show and have basic understanding about ProxyLogon #microsoft #windows #threats #informatique
https://y4y.space/2021/08/12/my-steps-of-reproducing-proxyshell/
REW-sploit is a tool focused on Metasploit6 x86/x64 payloads/shells + a more generic approach for meterpreter shells. REW-sploit will emulate shellcode, encryption keys will be extracted, parsing the PCAP it will identify the relevant connection, it will decrypt the conversation and it will dump content for further analysis #windows #python #informatique
sc(r)apy | full metal packets
> We Are the Borg
> You Will be Assimilated
> Resistance is Futile