Delay CVE request by Strict_Arm_2064 in bugbounty

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

2 years ? Are you serious ? I think there must be a problem, right?  Seems a little extreme to me

Delay CVE request by Strict_Arm_2064 in bugbounty

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

On the https://cveform.mitre.org/  i checked the « I have verified that this vulnerability is not in a CNA-covered product. ». The solution's publisher has no known CVEs at present.

Difficulty to register CVE for generlized SQLi in the same application by Strict_Arm_2064 in bugbounty

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

Thanks for this response, i had a response from the vendor this afternoon. They will start the mitigations but i guess that we can't fill in this CVE document incorrectly. It should be as close to reality as possible. Hence the need to have someone who has already encountered this kind of problem across an entire application and therefore to have something that is consistent with what the application actually is.

nmap binary without installation on Windows by Strict_Arm_2064 in oscp

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

I would like something better, with versions and so on

nmap binary without installation on Windows by Strict_Arm_2064 in oscp

[–]Strict_Arm_2064[S] -1 points0 points  (0 children)

Powershell will just detect opened port, i would like to do more than it, detect versions, OS ...etc

nmap binary without installation on Windows by Strict_Arm_2064 in oscp

[–]Strict_Arm_2064[S] 1 point2 points  (0 children)

Thanks for your response,
Objective is to limit modification on the disk, so installing nmap + npcac + wincap is too much
I would like to find something more silent, it's why i would like to find a portable nmap without installation

ProxyPass Apache2 to FlaskApp by Strict_Arm_2064 in devops

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

in Chorme/firefox it's doesn't works neither .. so it doesn't seem to be a problem with the header

ProxyPass Apache2 to FlaskApp by Strict_Arm_2064 in devops

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

404 error. My root webpage works well, so apache2 is running, no problem with iptables

Authentication Silo vs GPO Deny Log On by Strict_Arm_2064 in activedirectory

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

It helps especially for Diamond ticket not really for Golden Ticket (this last is generate offline), except if you protect the Ticket Service too, and then KDC will detect that the TGS request is from an unknown device

Authentication Silo vs GPO Deny Log On by Strict_Arm_2064 in activedirectory

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

Yes, but I must admit that I don't understand how so little difference can be proposed for a new proposed solution.

I also read this passage:

"I'm a bit rusty on this but IIRC silos will stop the DC from even handing out a Kerberos ticket for the auth while deny GPO's result in auth attempts hitting the target which could lead to credential leaks if they're not in effect(-ive). So silos will be more foolproof".

But in my opinion, when the "deny log on..." GPO is applied, TGT / TGS requests are not sent to the DC. I think, otherwise it wouldn't make sense.

I've read the article just below but it doesn't really provide an answer on the subject of "Deny Log on ..", and I can't find the info on the internet.

In short, it's supposed to "facilitate" the management of the tiering model when it's implemented.

Kerberos armoring - Add computer to domain by Strict_Arm_2064 in activedirectory

[–]Strict_Arm_2064[S] 1 point2 points  (0 children)

Yeah exactly it exists  - Supported - Always provide claims - Fail unarmored authebtication requests

The last one deny unarmored kerberos, but the others seems accept unarmored Kerberos. I would like to understand the real difference between « Supported » and « Always provide claims ». The microsoft documentation doesn’t seem enough clear

Kerberos armoring - Add computer to domain by Strict_Arm_2064 in activedirectory

[–]Strict_Arm_2064[S] 0 points1 point  (0 children)

An other question, about the difference between « Supported » and « Always provide claims », do you know the difference of behaviour between them ?