Cloud Security Featured GCP Cloud Function Abuse Article discussing GCP Cloud Function Abuse covering Local File Inclusion (LFI), Server-Side Request Forgery (SSRF), and Command Injection vulnerabilities. Explains how these vulnerabilities can be exploited to get access to authorization tokens and other sensitive information.
Cloud Security Featured Azure Function App Abuse Azure Function Apps: discover and exploit vulnerabilities like LFI and SSRF to gain access to source code and environment variables. Tutorial and demo in Python.
Tools Enter The Matrix v1.3.0 Enter The Matrix (ETM) introduces a full CRUD API with granular permissions to integrate ETM into workflows and produce metrics about organizations.
CVE Multiple CVEs: Brocade Fabric OS Multiple CVEs discovered in Brocade Fabric OS including hardcoded credentials and authenticated directory traversal and file read vulnerabilities. Attackers can read any file on the system and gain access to a restricted shell environment.
Tools Offensive-Azure Offensive-Azure is a platform-agnostic toolkit created to assist red teams and penetration testers. It includes two tools, device-code-easy-mode.py and token-juggle.py, with plans to add more. The tools were inspired by AADInternals and TokenTactics, and are open and loosely defined.
HackTheBox HackTheBox — Cap In this writeup we're looking at the Cap box from HackTheBox. This box goes into PCAP analysis and linux capability sets.
HackTheBox HackTheBox — Knife Covers network service scanning (T1046), software discovery (T1518), supply chain compromise (T1195.001) within the open source PHP project, remote code execution (T1210), compromising a user’s authorized_keys and id_rsa files (T1021.004), and abusing sudo (T1548.003) to gain root privileges.
HackTheBox HackTheBox — Ophiuchi The recently retired HTB machine Ophiuchi was assigned a “Medium” difficulty and featured a pretty interesting set of vulnerabilities leading to initial compromise and root access. This write up will give a step by step analysis of the machine and hopefully help those who struggled to complete it.
HackTheBox HackTheBox — Spectra Spectra is a retired HackTheBox machine that was ranked as “Easy”. It covered multiple simple vulnerabilities including directory listings, information leakage, clear-text credential leakage, remote code execution via WordPress plugin, and over-privileged sudo abilities.
CVE Multiple CVEs: Cisco Unified IP Conference Station 7937G Cisco: CVE-2020-16139, CVE-2020-16138, CVE-2020-16137: Unified IP Conference Station 7937G
CVE CVE 2020-26801: Tripp Lite Stored XSS CVE 2020-26801: A stored XSS vulnerability was discovered on the Tripp Lite SU2200RTXL2UA UPS device
Penetration Testing CRTP Reflections My hope is to provide those who are interested in the bootcamp, the lab environment, or in the CRTP certification some insight into what skills are provided and the overall structure of the offerings. There are a large number of options out there and choosing the right one for you is important.
Tools Enter The Matrix Enter The Matrix (ETM) is a Tool to Aid Operators During Risk Assessment in Creating Threat Matrices and Directed Threat Graphs