Advertisement · 728 × 90

Posts by mpgn

NFS escape to the root directory with NetExec

NFS escape to the root directory with NetExec

NFS downloading the /etc/shadow file from a system with default NFS configs

NFS downloading the /etc/shadow file from a system with default NFS configs

This looks off to you? Yeah...

In the default configuration, NFS exposes THE ENTIRE FILE SYSTEM and not only the exported directory!
This means that you can read every file on the system that is not root:root owned, e.g. /etc/shadow.

But it can get even worse 1/4🧵

1 year ago 8 4 1 0
Lucca - Confirmed / Senior Security Engineer - Purple Team 🎓 3 à 8 ans d'expérience requis en pentest et/ou red team 💼 Bac+5 💰 Salaire prévu entre 63 et 75K€ fixes bruts par an, selon l'expérience 📍 Nantes, Marseille, Paris ou Full remote (localisation en Fra...

🔐 Purple Team job alert ! 🛡️🚨🔥
Lucca ouvre un poste dans sa team sécu !

TL;DR : Du web, du k8s Talos, des millions de users, un prog de bounty mature, un ADN branché scalabilité dans une boîte qui cultive la transparence, l'expertise et la culture du challenge.

Bref, vous en saurez plus ici :👇

1 year ago 3 7 1 0
0x2C @croco_byte | Relai kerberos partie 2, SCCM, redteam ! by Hack'n Speak Twitter: ⁠https://x.com/croco_byteTwitter: ⁠https://x.com/mpgn_x64⁠Blog post - ⁠https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx- https://www.synacktiv.com/publication...

🇫🇷🎙️Nouvel épisode du podcast Hack'n Speak !

C'est la partie 2 du relais Kerberos, avec une section dédiée à SCCM et un petit supplément Red Team 🥷🐊

Bonne écoute à toutes et à tous 🎶

creators.spotify.com/pod/show/hac...

1 year ago 4 2 0 0
Post image

Generate a valid krb5 conf file directly from netexec 🔥

Not that NXC needs it, but sometimes you gotta help other tools for them to work. 😂

1 year ago 15 4 0 1
Post image

DCsync a domain when you find a user in the Backup Operators group using netexec, very simple and no need for a custom smb server 😛🏆

1 year ago 7 1 0 0
Post image Post image

So you want to exploit ADCS ESC8 with only netexec and ntlmrelayx ? Fear not my friend, I will show you how to do it 👇

NetExec now supports "Pass-the-Cert" as an authentication method, thanks to @dirkjanm.io original work on PKINITtools ⛱️

1 year ago 14 7 0 0

awesome as always 🔥

1 year ago 1 0 0 0
Preview
GitHub - dirkjanm/BloodHound.py: A Python based ingestor for BloodHound A Python based ingestor for BloodHound. Contribute to dirkjanm/BloodHound.py development by creating an account on GitHub.

Few BloodHound python updates: LDAP channel binding is now supported with Kerberos auth (native) or with NTLM (custom ldap3 version). Furthermore, the BH CE collector now has its own pypi package and command. You can have both on the same system with pipx. github.com/dirkjanm/Blo...

1 year ago 29 14 2 0
Post image

ldap socks on netexec / nxc 🎃

1 year ago 7 2 0 0
Advertisement
Diagram representing the various Windows Point and Print configurations that reintroduce the PrintNightmare exploit variants.

Diagram representing the various Windows Point and Print configurations that reintroduce the PrintNightmare exploit variants.

I updated the diagram representing the different Point and Print configurations and their exploitation on my blog.

Hopefully, this should provide a better understanding of the whole "PrintNightmare" situation to both defenders and red teamers. 🤞

1 year ago 18 8 0 0

This is the paradox of security and it. Doing your job well results in nothing (in a good way). Mistakes are blown up and noticed (in a bad way).

1 year ago 6 2 2 1
Post image

hear me out, pass the certificate auth on nxc 🔥

1 year ago 7 3 0 0

merged on main 🎃

1 year ago 1 1 0 0
Post image

Thanks to Xiaolichan, NXC is now capable of scanning your network without attempting SMBv1 first by using the flag --no-smbv1. This reduces unexpected errors and scan time on large networks. 👺

A new module has also been added to scan hosts vulnerable to the Remove-MIC vulnerability 🔥

1 year ago 7 3 0 1
Post image

bye bye smb on ldap proto, coming soon 👺

1 year ago 3 1 1 0
Post image

I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...

1 year ago 63 43 3 0

Vous savez quoi ? @mpgn.bsky.social est désormais sur Bluesky ! 👀

L'occasion rêvée pour reposter le lien vers mon intervention sur son podcast Hack'n'Speak 🎙️

1 year ago 3 1 0 0
Post image Post image Post image

Two new modules for MSSQL on NXC, thanks to the contributions of @lodos2005.bsky.social and @adamkadaban.bsky.social 🔥

- rid-brute from mssql
- mssql_coerce from mssql

github.com/Pennyw0rth/N...

1 year ago 12 7 0 0
Advertisement

Pour mes followers francophones, voici mon intervention pour le podcast Hack’n’Speak de MPGN https://podcasters.spotify.com/pod/show/hacknspeak

2 years ago 2 1 0 1
Post image

If you want to first blood a windows box in @hackthebox.bsky.social every minute counts ! 🩸
I've added a special flag --generate-hosts-file so you just have to copy past into your /etc/hosts file and be ready to pwn as soon as possible 🔥

1 year ago 3 1 0 0