This Metasploit module exploits a command injection vulnerability in the /admin/monitoringplugins.php page of Nagios XI versions prior to 5.8.0 when uploading plugins. Successful exploitation allows an authenticated admin user to achieve remote code execution as the apache user by uploading a malicious plugin. Valid credentials for a Nagios XI admin user are required. This module has been successfully tested against Nagios versions XI 5.3.0 and 5.7.5, both running on CentOS 7.
1c6d22c62a86e7b5f3dedccebd30589cc4a30d490a6e2f222d47174bbda1bf57
Nagios XI version 5.7.x authenticated remote code execution exploit.
a119b58a59d4b77e207cb105c66e07013d9044d73c89ebfb091d7bd8b48bda06
Whitepaper called A Purple Team Study Into "PowerLessShell" Tool.
3cc365767082e583a3456113fff6269c2543bcfaf65e3309eec06360d2795c24
This paper discusses how intrusion detection systems work. After getting a solid understanding of the working mechanism of IDS, they discuss how packet reassembly works and then moves forward to look into different policy implemented for packet reassembly where it is dependent on the operating system implementation of the RFC.
e80ccbaa83ffad3bf1cde6de0396cae423f3afd12c0a5a44cb9a16f8090938f4
Whitepaper that goes over a full attack scenario by getting a foothold through Microsoft Exchange OWA Portal to discover and abuse MSSQL.
1e359078a38e5ef9da11966368cd8309e0715ec901171b245500b208e0b296e2
Whitepaper called Abusing COM and DCOM Objects.
5fd1de5a2df55fca764f1fb18fe5f7e5b49b94117032c4e071b37fcbeb66bcd5
Whitepaper called Abusing Windows Data Protection API.
773a6f1530d77d0420be2e70d5bd4c5c42a05dd949691ff60a9439f5d56f0977
Whitepaper called OAuth 2.0 Implementation and Security.
51889b9cb5896e34189c448f717b7809247336b04dd3ebd03675f4128321eeee
Whitepaper called Hunting Red Team Activities with Forensics Artifacts.
36c6a099b355717d492a8ce32ba064c4db6bb7183d16c52762e1fda45ae671c4
Whitepaper called Kerberos: Achieving Command Execution Using Silver Tickets.
83cd3b8ff1c0604296dc343f1d6082284f701d9ad005d072d420258dfcc14ab5
Whitepaper called Azure Cloud Penetration Testing.
010abdb9fb0aade0f3069233123a715c500ef8109672854c0e91782317bdfff1
This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller.
e14b464d7c303fba5728ee884839d733cf9da1cb6bbb6f3af26614652cc21681
Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.
d144ad77a37772ef7438ee197b5897733e66ad7a5604341fd7ff544e87768022
Whitepaper called Active Directory Enumeration with PowerShell.
fffbc506324136811bf2f295f04bd4158eff596137de87f5ffc17f656996a8e4
Joomla versions 1.5.0 through 3.9.4 suffer from arbitrary file deletion and directory traversal vulnerabilities.
53b8b3b18868765214204a82f2af5d3caa0c20dbe06f39856c11642e46e530b9
Whitepaper called Windows Privilege Escalation.
10db37c396add01464021e2f2a09c672ffb62d7ce83d2fff079b70964abf8c91
Joomla CW Article Attachments extension version 1.0.6 suffers from a remote SQL injection vulnerability.
95468dbea961116803f77bc5134ea076b566d29ebb8b80e3a671bf40ab74c484
Whitepaper explaining the consequences of XML eXternal Entity injection and basic to advanced exploitation.
b59f215626effafd3b75833196163d72155af32bcf297ac1aa8b944e18d90442
LiteCart version 2.1.2 suffers from a remote file upload vulnerability.
ed1e12bce52186df2f795ae04cadc87331293500e61d16468839c9658b1cf156
Whitepaper called File Upload Restrictions Bypass.
ecdc7e311c189addfccc427be028ffc44cae8e359d45a96d8cb873b10efe1626
Whitepaper called Protecting Apps Against Jailbreaking And Rooting. Written in Arabic.
a8328bd85768b6fd09641ed177fbcc166a7c93147dd6e340ecd03511dc10b4d1
Whitepaper called VLAN Hopping Attack.
a4ee8de88105ca564a8ae64d14c9f45a720753fc1ea57f3fdf05e620dacf3d2d
Whitepaper called Abusing Kerberos: Kerberoasting.
90e5ba64d14b541cd45c26d45a5af701af4e2a7945959b2f554231973affcdff
Whitepaper called EggHunter Buffer Overflow for Windows. Written in Arabic.
2bfed292e02018566ece557c276b5957224e44b1fd1f1b4fdb9981a2795a6c06
Whitepaper called Lateral Movement using WinRM. Written in Arabic.
f4c899e0fb64fffc6ec0c49647494076b523743696280a7f539e095362ea70b2