RedForce (@redforcesec) 's Twitter Profile
RedForce

@redforcesec

security consultancy company providing offensive security services for unlimited scale of business.

ID: 1043673840478572544

linkhttps://redforce.io calendar_today23-09-2018 01:30:08

26 Tweet

941 Takipçi

19 Takip Edilen

RedForce (@redforcesec) 's Twitter Profile Photo

A 10k bounty tale writeup by our team member Ahmed Sultan 🇪🇬🇵🇸, explaining the exploitation of SQL injection issue inside insert query where it wasn't possible to use commas as part of the exploit payload. blog.redforce.io/sql-injection-… Happy reading

RedForce (@redforcesec) 's Twitter Profile Photo

Kerberoasting revealed. The 1st part of Microsoft Kerberos implementation attacks series by our team member @Hatemsec . blog.redforce.io/oh-my-kerberos… Happy reading. #PenTest #redteam

André Baptista (@0xacb) 's Twitter Profile Photo

Just released viewgen, a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys or web.config files. All algorithms supported. TL;DR: Got a web.config file or LFI on ASP.NET? Pop a shell! github.com/0xACB/viewgen

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

"There is no pre-auth RCE in Jenkins since May 2017, but this is the one!" Relase a more reliable and elegant exploit - "awesome-jenkins-rce-2019" from my #HITB2019AMS talk. Thanks Mikhail Egorov and George Noseevich join this party! github.com/orangetw/aweso…

"There is no pre-auth RCE in Jenkins since May 2017, but this is the one!"
Relase a more reliable and elegant exploit - "awesome-jenkins-rce-2019" from my #HITB2019AMS talk. Thanks <a href="/0ang3el/">Mikhail Egorov</a> and <a href="/webpentest/">George Noseevich</a> join this party! github.com/orangetw/aweso…
Ahmed Aboul-Ela (@aboul3la) 's Twitter Profile Photo

This will have huge impact!, another great example on how RCE can be achieved on OWA easily through ViewState deserialization attack. Red Teamers it's your chance now :) thezdi.com/blog/2020/2/24…

RedForce (@redforcesec) 's Twitter Profile Photo

Attacking Helpdesks (Part 1): Remote Code Execution (#RCE) chain on #Deskpro with #Bitdefender as a case study. Full technical details to #exploit RCE inside. blog.redforce.io/attacking-help… #BugBounty #websecurity #infosecwriteup

Attacking Helpdesks (Part 1): Remote Code Execution (#RCE) chain on #Deskpro with #Bitdefender as a case study. Full technical details to #exploit RCE inside.
blog.redforce.io/attacking-help…

#BugBounty #websecurity  #infosecwriteup
RedForce (@redforcesec) 's Twitter Profile Photo

We have updated the article with another "UNPATCHED" vector to achieve RCE. Thanks Mahmoud Gamal for the heads up. blog.redforce.io/attacking-help…

RedForce (@redforcesec) 's Twitter Profile Photo

We've just published the 1st part of the Windows authentication attacks series. blog.redforce.io/windows-authen… The series suppose to cover the NTLM/Kerberos authentication in detail as well as how their attacks work. Happy reading, and stay tuned for part 2.

We've just published  the 1st part of the Windows authentication attacks series.
blog.redforce.io/windows-authen…
The series suppose to cover the NTLM/Kerberos authentication in detail as well as how their attacks work.
Happy reading, and stay tuned for part 2.
RedForce (@redforcesec) 's Twitter Profile Photo

Our team member Ahmed Sultan 🇪🇬🇵🇸 just published the 2nd part of windows authentication attacks. This part covers Kerberos authentication process and technical analysis of widely used Kerberos attacks. blog.redforce.io/windows-authen… Happy reading

Our team member <a href="/0x4148/">Ahmed Sultan 🇪🇬🇵🇸</a> just published the 2nd part of windows authentication attacks. This part covers Kerberos authentication process and technical analysis of widely used Kerberos attacks.
blog.redforce.io/windows-authen…
Happy reading
Bug Bounty Reports Explained (@gregxsunday) 's Twitter Profile Photo

The video about blind SSRF in Google Cloud for which David Nechuta got $31k is out! Watch it to see how it's sometimes possible to exfiltrate data with blind SSRFs. You can also test your own skills with hands-on lab 😎 Enjoy! youtu.be/ashSoc59z1Y