Recently, I wrote a write-up for the vulnerable machine from #VulNyx called Controler. It’s a medium-level #Windows machine. #Enumeration begins with the Kerberos account, which I use to gain initial system access. Through further Active Directory enumeration, I #exploit replication rights, ultimately extracting the Domain Administrator’s password hash and gaining full administrative control.

Solving this machine took me some time, but I learned a lot. I touched on new tools like #BloodHound, delved a bit deeper into Active Directory, and, in general, kept my #pentesting skills in check.

If you are starting in #cybersecurity, I would definitely recommend checking some VMs from VulNyx.

https://medium.com/@thecybercraft/vulnyx-controler-writeup-b9ada8e12fdd

Sekken-enum: tool for subdomain enumeration

A GitHub repo offering a tool to perform high-speed subdomain enumeration using wordlists, API integration, and recursive bruteforce.

https://github.com/Nomad0x7/sekken-enum

#Recon #Enumeration

GitHub - Nomad0x7/sekken-enum: adws enumeration bof

adws enumeration bof. Contribute to Nomad0x7/sekken-enum development by creating an account on GitHub.

GitHub

STM32 Short #8 - Understanding USB Enumeration (re-enumeration)

In this videi we will cover the topic of USB Enumeration and how to trigger a USB Host to re-enumerate a STM32 USB Device (or Gadget).

#STM32 #Tutorial #STM32CubeIDE #STM32CubeMX #USB #Enumeration #STM32World

https://www.youtube.com/watch?v=osNf6gyF_zY

STM32 Short #8 - Understanding USB Enumeration (re-enumeration)

YouTube

🤔 Ever wonder how to escape from a container? Or how security tools know what permissions they have from inside that same container? It's nice to have a great script for #enumeration ... but what does it check for and why does it matter?

(or, I did a little editing and put my workshop from @appsec_village at #DEFCON33 up) 

Container Escapes 101 - Who am I?

To start our escape, let’s figure out who we are inside our container first. That’ll help us chart a path out.

Some Natalie’s corner of the internet

Subdomain enumeration is an essential OSINT technique. Amass and Subfinder are well-known enumeration tools, but they have limitations. Explore this comprehensive database with over 200 sources.

https://osintteam.com/passive-subdomain-enumeration-uncovering-more-subdomains-than-subfinder-amass/

#OSINT #Subdomains #Domains #DNS #enumeration

Passive Subdomain Enumeration: Uncovering More Subdomains than Subfinder & Amass

Subdomain Center notes over 200 competitors, yet Amass integrates 87 and Subfinder 45; this article explores better subdomain enumeration tools.

OSINT Team - Learn OSINT from experts

Finally finished implementing the functionality of the PS function for #Enumeration that I've been working on since I saw some flaws in the currently existing tools while studying for #CRTE

It's focused on trying to show interesting ACLs without overwhelming you with lots of useless information. There's probably something out there that does that already (Find-InteterestingDomainAcl is supposed to do the trick but it's still too verbose for me). However, I needed an excuse to dive deeper into ACLs 😜

After cleaning the current monolith of PS scripting and allowing @maikel to peer review it, I'll publish it ☺️

In this week's Linux Update newsletter, Chris Binnie looks at the enumeration tools feroxbuster and ffuf for automating search during a cyberattack
https://www.linux-magazine.com/Issues/2025/290/Enumerating-Resources
#security #tools #feroxbuster #ffuf #enumeration #cyberattack #automation #fuzzing
Looking for Cracks » Linux Magazine

A cyberattack unfolds in stages. The enumeration phase is when the attacker looks for holes in the target system. Tools like feroxbuster and ffuf b...

Linux Magazine

Title of the day: "generatingfunctionology"

https://www2.math.upenn.edu/~wilf/gfologyLinked2.pdf

#enumeration

who spies on you more - ms, apple, google or amazon - ai surveillance content from rob braxman
https://www.youtube.com/watch?v=QwxaRPuJkyU
#tracking #capital surveillance #enumeration #ever cookie
Which Device AI Spies on You the Most: Microsoft, Apple or Google? NOT Who You Think

YouTube

Oh boy. A simple #enumeration #attack could be used to read credit offers at #CHECK24 and #verivox, two big German portal offering a lot of things around comparing credit offers, insurance contracts and other things.

This is such a trivial mistake, it nearly feels deliberate. This should never ever happend. And for sure this should have be a red flag in any #securityaudit. I wonder how they can state "No indications of miss use.". #cybersecurity

Article in German:
https://correctiv.org/aktuelles/datenschutz/2024/09/17/kreditvermittlung-bei-check24-und-verivox-kritische-datenlecks-entdeckt/

Kreditvermittlung bei Check24 und Verivox: Kritische Datenlecks entdeckt

Sicherheitslücken ermöglichten auf beiden Vergleichsportalen einen Zugriff auf heikle Kundendaten. Chaos Computer Club spricht von „Supergau“

correctiv.org