266 Followers
52 Following
17 Posts

UPDATE: New Microsoft Exchange Zero-Day Vulnerabilities (CERT-EU Security Advisory 2022-068)

On September 28, 2022, the security researchers at Vietnamese cybersecurity vendor GTSC published a blog post claiming they have discovered an attack campaign which utilised two zero-day bugs in Microsoft Exchange that could allow an attacker a remote code execution. The attackers are chaining the pair of zero-days to deploy web shells, notably China Choppers, on compromised servers for persistence and data theft, as well as move laterally to other systems on the victims' networks.
Microsoft had identified the vulnerabilities as CVE-2022-41040, a Server-Side Request Forgery (SSRF) vulnerability, while the second, identified as CVE-2022-41082, allows remote code execution (RCE) when PowerShell is accessible to the attacker.
CrowdStrike recently discovered a new exploit method (called OWASSRF) consisting of CVE-2022-41080 and CVE-2022-41082 to achieve remote code execution (RCE) through Outlook Web Access (OWA).

https://www.cert.europa.eu/static/SecurityAdvisories/2022/CERT-EU-SA2022-068.pdf

Finally, the last part of GOAD writeup is done ! 🥳
Part 12 trust 

https://mayfly277.github.io/posts/GOADv2-pwning-part12/

GOAD - part 12 - Trusts

On the previous post (Goad pwning part11) we tried some attacks path with ACL. This post will be on escalation with domain trust (from child to parent domain) and on Forest to Forest trust lateral move.

Mayfly

Goad writeup part 11 is up. This one is about acl/ace exploitation.

https://mayfly277.github.io/posts/GOADv2-pwning-part11/

GOAD - part 11 - ACL

On the previous post (Goad pwning part10) we did some exploitation by abusing delegation. On this blog post, we will have fun with ACL in the lab.

Mayfly

📜 ADCS module for #RustHound 🦀 is out (v1.1.0)

⚙️ Collect CA and Templates for @ly4k BH version
⚙️ Or like Certipy collect CA and Templates for official BH version

https://github.com/OPENCYBER-FR/RustHound#module-adcs-collector

🧵 Example for @ly4k BloodHound version:

https://github.com/ly4k/BloodHound
rusthound.exe -d essos.local -f meereen -o output -z --adcs

🧵 Example for official BloodHoundAD version:

https://github.com/BloodHoundAD/BloodHound
rusthound.exe -d essos.local -f meereen -o output -z --adcs --old-bloodhound

🧵 Examples are done on the GOADv2

Thanks to @Mayfly for the lab!
https://github.com/Orange-Cyberdefense/GOAD

🧵 Special thanks to @ly4k for your work on Certipy!

GitHub - OPENCYBER-FR/RustHound: Active Directory data collector for BloodHound written in Rust. 🦀

Active Directory data collector for BloodHound written in Rust. 🦀 - GitHub - OPENCYBER-FR/RustHound: Active Directory data collector for BloodHound written in Rust. 🦀

GitHub

RT @testanull
You guys must be waiting for this,
So this is the working PoC script of the Exchange 0day exploited ITW

https://github.com/testanull/ProxyNotShell-PoC

GitHub - testanull/ProxyNotShell-PoC

Contribute to testanull/ProxyNotShell-PoC development by creating an account on GitHub.

GitHub

If you haven't already look at it. I recommend you to watch this if you want to learn more on coerce in active directory :

https://youtu.be/b0lLxLJKaRs

BHIS | Coercions and Relays – The First Cred is the Deepest with Gabriel Prud'homme | 1.5 Hours

YouTube
dirkjanm/ROADtools: A collection of Azure AD tools for offensive and defensive security purposes
https://github.com/dirkjanm/ROADtools
GitHub - dirkjanm/ROADtools: A collection of Azure AD/Entra tools for offensive and defensive security purposes

A collection of Azure AD/Entra tools for offensive and defensive security purposes - dirkjanm/ROADtools

GitHub
@itisiboller I might do a demo version of the Professional version against a "known" lab or something, if there's interest. For instance the GOAD one from @Mayfly

Play with the ad lab goadv2 - part 10 : delegations
- constrained
- unconstrained (with and without protocol transition)
- resource based

https://mayfly277.github.io/posts/GOADv2-pwning-part10/

GOAD - part 10 - Delegations

On the previous post (Goad pwning part9) we done some lateral move on the domain.

Mayfly

La semaine dernière j'étais l'invité de @mpgn_x64 pour son podcast Hack'n Speak. On a discuté de la génèse du projet PayloadsAllTheThings. Il parait que ça s'écoute bien dans les transports en commun😏
---
RT @hacknspeak
🇫🇷🎙️ Nouvel épisode du podcast Hack'n Speak accompagné de @pentest_swissky pour parler bien évidement de PayloadsAllTheThings & SSRFmap 🔥

Un épisode tout en légèreté pour débuter novembre 🌧️

Bonne écoute à toutes et à …
https://twitter.com/hacknspeak/status/1587753093495668736

Hack'n Speak on Twitter

“🇫🇷🎙️ Nouvel épisode du podcast Hack'n Speak accompagné de @pentest_swissky pour parler bien évidement de PayloadsAllTheThings & SSRFmap 🔥 Un épisode tout en légèreté pour débuter novembre 🌧️ Bonne écoute à toutes et à tous 🎶 https://t.co/tFTShrdMHE”

Twitter