266 Followers
52 Following
17 Posts

UPDATE: New Microsoft Exchange Zero-Day Vulnerabilities (CERT-EU Security Advisory 2022-068)

On September 28, 2022, the security researchers at Vietnamese cybersecurity vendor GTSC published a blog post claiming they have discovered an attack campaign which utilised two zero-day bugs in Microsoft Exchange that could allow an attacker a remote code execution. The attackers are chaining the pair of zero-days to deploy web shells, notably China Choppers, on compromised servers for persistence and data theft, as well as move laterally to other systems on the victims' networks.
Microsoft had identified the vulnerabilities as CVE-2022-41040, a Server-Side Request Forgery (SSRF) vulnerability, while the second, identified as CVE-2022-41082, allows remote code execution (RCE) when PowerShell is accessible to the attacker.
CrowdStrike recently discovered a new exploit method (called OWASSRF) consisting of CVE-2022-41080 and CVE-2022-41082 to achieve remote code execution (RCE) through Outlook Web Access (OWA).

https://www.cert.europa.eu/static/SecurityAdvisories/2022/CERT-EU-SA2022-068.pdf

Finally, the last part of GOAD writeup is done ! ๐Ÿฅณ
Part 12 trust 

https://mayfly277.github.io/posts/GOADv2-pwning-part12/

GOAD - part 12 - Trusts

On the previous post (Goad pwning part11) we tried some attacks path with ACL. This post will be on escalation with domain trust (from child to parent domain) and on Forest to Forest trust lateral move.

Mayfly

Goad writeup part 11 is up. This one is about acl/ace exploitation.

https://mayfly277.github.io/posts/GOADv2-pwning-part11/

GOAD - part 11 - ACL

On the previous post (Goad pwning part10) we did some exploitation by abusing delegation. On this blog post, we will have fun with ACL in the lab.

Mayfly

๐Ÿ“œ ADCS module for #RustHound ๐Ÿฆ€ is out (v1.1.0)

โš™๏ธ Collect CA and Templates for @ly4k BH version
โš™๏ธ Or like Certipy collect CA and Templates for official BH version

https://github.com/OPENCYBER-FR/RustHound#module-adcs-collector

๐Ÿงต Example for @ly4k BloodHound version:

https://github.com/ly4k/BloodHound
rusthound.exe -d essos.local -f meereen -o output -z --adcs

๐Ÿงต Example for official BloodHoundAD version:

https://github.com/BloodHoundAD/BloodHound
rusthound.exe -d essos.local -f meereen -o output -z --adcs --old-bloodhound

๐Ÿงต Examples are done on the GOADv2

Thanks to @Mayfly for the lab!
https://github.com/Orange-Cyberdefense/GOAD

๐Ÿงต Special thanks to @ly4k for your work on Certipy!

GitHub - OPENCYBER-FR/RustHound: Active Directory data collector for BloodHound written in Rust. ๐Ÿฆ€

Active Directory data collector for BloodHound written in Rust. ๐Ÿฆ€ - GitHub - OPENCYBER-FR/RustHound: Active Directory data collector for BloodHound written in Rust. ๐Ÿฆ€

GitHub

RT @testanull
You guys must be waiting for this,
So this is the working PoC script of the Exchange 0day exploited ITW

https://github.com/testanull/ProxyNotShell-PoC

GitHub - testanull/ProxyNotShell-PoC

Contribute to testanull/ProxyNotShell-PoC development by creating an account on GitHub.

GitHub

If you haven't already look at it. I recommend you to watch this if you want to learn more on coerce in active directory :

https://youtu.be/b0lLxLJKaRs

BHIS | Coercions and Relays โ€“ The First Cred is the Deepest with Gabriel Prud'homme | 1.5 Hours

YouTube
dirkjanm/ROADtools: A collection of Azure AD tools for offensive and defensive security purposes
https://github.com/dirkjanm/ROADtools
GitHub - dirkjanm/ROADtools: A collection of Azure AD/Entra tools for offensive and defensive security purposes

A collection of Azure AD/Entra tools for offensive and defensive security purposes - dirkjanm/ROADtools

GitHub
@mikeymikey @lkarlslund @ericazelic
Could be a good idea.
@itisiboller I might do a demo version of the Professional version against a "known" lab or something, if there's interest. For instance the GOAD one from @Mayfly

Play with the ad lab goadv2 - part 10 : delegations
- constrained
- unconstrained (with and without protocol transition)
- resource based

https://mayfly277.github.io/posts/GOADv2-pwning-part10/

GOAD - part 10 - Delegations

On the previous post (Goad pwning part9) we done some lateral move on the domain.

Mayfly