
Ahmed Sher
@crypt0acee
big nerd energy
ID: 1354118745069920260
https://crypt0ace.github.io/ 26-01-2021 17:27:32
189 Tweet
141 Followers
770 Following

Oh holy Nimikätz / custom invoke-mimikatz If you want the l33t shit for your next engagement you should: Read -> s3cur3th1ssh1t.github.io/Bypass-AMSI-by… Read -> s3cur3th1ssh1t.github.io/Building-a-cus… Use -> github.com/danielbohannon… from Daniel Bohannon Use -> private tools from S3cur3Th1sSh1t by sponsoring him













Opensource from Hack The Box involved a flask application running in debug mode, vulnerable to directory traversal had two routes, uploading your own route or generating the console pin, accessing gitea, and escalating privileges through git hooks. arz101.medium.com/hackthebox-ope…

Shared from Hack The Box involved exploiting sqli in json, ipython for code execution, finding credentials to redis from a golang binary, and abusing CVE-2022–0543 for privilege escalation arz101.medium.com/hackthebox-sha…

Hathor from Hack The Box , an insane windows machine, involved logging into mojoportal with defautlt creds, uploading aspx web shell, IIS Impersonation, Bypassing Applocker, DLL Hijacking, signing powershell script and DCsync. arz101.medium.com/hackthebox-hat…

We're happy to be sponsoring HackSpaceCon 23. Did someone say pool party? #hackspacecon

☢️ClickOnce + AppDomain Manager Injection (aka signed EXE + DLL sideloading) is the new Initial Access Hotness❤️ Check out Nick Powers and Steven insights on weaponising them: posts.specterops.io/less-smartscre… Pssst. there's a training & framework already scratching that surface too🥳



Wrote a complete walkthrough of the NHA lab by Mayfly. Give it a read if youre interested in pwning an AD environment from start to finish with some really interesting pathways! crypt0ace.github.io/posts/NHA-Part… crypt0ace.github.io/posts/NHA-Part… crypt0ace.github.io/posts/NHA-Part… crypt0ace.github.io/posts/NHA-Part…