ℹ️ This was duplicated to this blog for readability and reference
The most difficult challenge with RMM detection is contextual awareness around usage to determine if it is valid or malicious.
| { | |
| "name": "Integration Raindrop.io, OpenAI (ChatGPT, Whisper, DALL-E)", | |
| "flow": [ | |
| { | |
| "id": 1, | |
| "module": "raindrop-io:watchBookmarks", | |
| "version": 1, | |
| "parameters": { | |
| "__IMTCONN__": 2363503, | |
| "collection": { |
| /* | |
| TaskManagerSecret | |
| Author: @splinter_code | |
| This is a very ugly POC for a very unreliable UAC bypass through some UI hacks. | |
| The core of this hack is stealing and using a token containing the UIAccess flag set. | |
| A trick described by James Forshaw, so all credits to him --> https://www.tiraniddo.dev/2019/02/accessing-access-tokens-for-uiaccess.html | |
| From there it uses a task manager "feature" to run a new High IL cmd.exe. | |
| This has been developed only for fun and shouldn't be used due to its high unreliability. |
ℹ️ This was duplicated to this blog for readability and reference
The most difficult challenge with RMM detection is contextual awareness around usage to determine if it is valid or malicious.
| #!/usr/bin/python3 | |
| # From DOS commandline, run this as follows:- | |
| # python3 ejectusb.py | |
| # -or- create C:\windows\ejectusb.bat to do the above in fewer characters. | |
| # | |
| # From WSL bash, run it as follows:- | |
| # cmd.exe /c start python3 C:\\windows\\ejectusb.py | |
| # -or- create /usr/local/bin/ejectusb to do the above in fewer characters. |
In the default configuration of Active Directory, it is possible to remotely take over Workstations (Windows 7/10/11) and possibly servers (if Desktop Experience is installed) when their WebClient service is running. This is accomplished in short by;
The caveat to this is that the WebClient service does not automatically start at boot. However, if the WebClient service has been triggered to start on a workstation (for example, via some SharePoint interactions), you can remotely take over that system. In addition, there are several ways to coerce the WebClient service to start remotely which I cover in a section below.
| #!/bin/bash | |
| # Step 1: Obtain a list of our personal hosts. | |
| # Export from Bitwarden, LastPass, 1Password, or similar: | |
| my_passwords.txt | |
| # Next commands will assume the LastPass export format, which is CSV with the URL in the first field: | |
| # url,username,password,[... more fields] |
| #!/usr/bin/env python3 | |
| # v.0.3 | twitter.com/si9int | |
| import requests, sys | |
| from bs4 import BeautifulSoup as bs | |
| domain = sys.argv[1] | |
| subdomains = [] | |
| def get_csrf_params(): | |
| csrf_params = {} |
| FROM golang:1.12 as build | |
| WORKDIR $GOPATH/src/github.com/Irio/wohnung | |
| COPY scraper scraper | |
| COPY main.go . | |
| RUN go get -d -v ./... | |
| RUN go install | |
| FROM gcr.io/distroless/base |
| https://github.com/search?q=BROWSER_STACK_ACCESS_KEY= OR BROWSER_STACK_USERNAME= OR browserConnectionEnabled= OR BROWSERSTACK_ACCESS_KEY=&s=indexed&type=Code | |
| https://github.com/search?q=CHROME_CLIENT_SECRET= OR CHROME_EXTENSION_ID= OR CHROME_REFRESH_TOKEN= OR CI_DEPLOY_PASSWORD= OR CI_DEPLOY_USER=&s=indexed&type=Code | |
| https://github.com/search?q=CLOUDAMQP_URL= OR CLOUDANT_APPLIANCE_DATABASE= OR CLOUDANT_ARCHIVED_DATABASE= OR CLOUDANT_AUDITED_DATABASE=&s=indexed&type=Code | |
| https://github.com/search?q=CLOUDANT_ORDER_DATABASE= OR CLOUDANT_PARSED_DATABASE= OR CLOUDANT_PASSWORD= OR CLOUDANT_PROCESSED_DATABASE=&s=indexed&type=Code | |
| https://github.com/search?q=CONTENTFUL_PHP_MANAGEMENT_TEST_TOKEN= OR CONTENTFUL_TEST_ORG_CMA_TOKEN= OR CONTENTFUL_V2_ACCESS_TOKEN=&s=indexed&type=Code | |
| https://github.com/search?q=-DSELION_BROWSER_RUN_HEADLESS= OR -DSELION_DOWNLOAD_DEPENDENCIES= OR -DSELION_SELENIUM_RUN_LOCALLY=&s=indexed&type=Code | |
| https://github.com/search?q=ELASTICSEARCH_PASSWORD= OR ELASTICSEARCH_USERNAME= OR EMAIL_NOTIFI |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module: