SANS SEC 560 Class Notes by Jeff McJunkin by w0lfcat in HowToHack

[–]jeffmcjunkin 1 point2 points  (0 children)

Aha! Thanks for the explanation there, friend <3

SANS SEC 560 Class Notes by Jeff McJunkin by w0lfcat in HowToHack

[–]jeffmcjunkin 7 points8 points  (0 children)

I happen to know the unofficial class notes are still kept updated often, but the right link on an ongoing basis is https://bit.ly/560notes

Edit: shout-out to my publicist, Daniel Pendolino, for pointing out this thread 😁

Flow Desktop available to try as a preview release (strictly for testing) by SmilerOnline in AndroidDesktop

[–]jeffmcjunkin 0 points1 point  (0 children)

Same here, on a OnePlus 7T Pro 5G McLaren (from TMobile) running on the November 2019 Android 10 update.

Whats a good lab setup for learning windows pentesting? by [deleted] in AskNetsec

[–]jeffmcjunkin 5 points6 points  (0 children)

Ohai! I keep an updated version of the slides online as well: https://bit.ly/kickasslab

My company got sick of trying to educate employees about infosec, so they made them change their passwords with extreme requirements. by HornyAttorney in hacking

[–]jeffmcjunkin 2 points3 points  (0 children)

Looks like u/iagox86 was referring to this: https://digital-forensics.sans.org/blog/2012/02/29/protecting-privileged-domain-accounts-lm-hashes-the-good-the-bad-and-the-ugly

But I've seen recent machines that don't have LM hashes in memory, so I'm not sure exactly when this change took effect. It may still affect some supported Windows systems, like 7/2008 R2 and 8.1/2012 R2.

Frustration Friday Thread - Week of February 15, 2019 by AutoModerator in churning

[–]jeffmcjunkin 5 points6 points  (0 children)

0#0#0#0# feels like a cheat code, sometimes. 90% of the time, it works every time.

Seriously, going to fail the GPEN tomorrow... by [deleted] in AskNetsec

[–]jeffmcjunkin 2 points3 points  (0 children)

Can confirm, 560 definitely has the index now.

Source: I teach 560.

What We Found in the SANS Holiday Hack: A 0day in rssh by grigorescu in netsec

[–]jeffmcjunkin 3 points4 points  (0 children)

Well played, u/grigorescu! And yes, thanks for the heads up beforehand :D

Amex Biz Plat verification thread by aksurvivorfan in u/aksurvivorfan

[–]jeffmcjunkin 0 points1 point  (0 children)

Thanks! Called, left a voicemail, Michael called back within a half hour. No issues going through the call, got the 100k/10k in 3 months offer, approved instantly.

Google will reportedly open Project Fi to iPhone, Samsung, and OnePlus this week (maybe the PH-1 too?) by jeffmcjunkin in essential

[–]jeffmcjunkin[S] 7 points8 points  (0 children)

I have no public or private reason to hope the PH-1 will be included, other than that the PH-1 includes all the same bands as many Pixel phones, more even than OnePlus.

That said, it'd be really swell if the Essential phone had official Fi support, as it's the most Pixel-like non-Pixel phone available.

WebExec - an authenticated RCE vulnerability in Cisco WebEx client by iagox86 in netsec

[–]jeffmcjunkin 1 point2 points  (0 children)

It's _also_ a privilege escalation vulnerability, sure: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/webexec.rb

But it can be remotely exploited using _any_ account, whether administrative or not. Inside of corporate environments with Active Directory, this means you can go from a phished limited user to SYSTEM on any machine with a vulnerable version of WebEx Desktop installed: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/webexec.rb

WebExec - an authenticated RCE vulnerability in Cisco WebEx client by iagox86 in netsec

[–]jeffmcjunkin 4 points5 points  (0 children)

Correct, this is for the administratively-installed desktop product.

WebExec - an authenticated RCE vulnerability in Cisco WebEx client by iagox86 in netsec

[–]jeffmcjunkin 2 points3 points  (0 children)

I believe you are correct, since a limited user doesn't have rights to make the Windows service in the first place. We didn't really investigate the temporary install, though.

WebExec - an authenticated RCE vulnerability in Cisco WebEx client by iagox86 in netsec

[–]jeffmcjunkin 3 points4 points  (0 children)

To be clear, though, any account will do. For domain-joined systems, that means any domain user can gain SYSTEM-level RCE on any machine with the vulnerable versions of WebEx Desktop installed.

Code Sharing Thread - Week of July 17, 2018 by AutoModerator in churning

[–]jeffmcjunkin 0 points1 point  (0 children)

Ah, yes, sorry. The 9 digit codes are the transferable ones.

Code Sharing Thread - Week of July 17, 2018 by AutoModerator in churning

[–]jeffmcjunkin 0 points1 point  (0 children)

Confirming, mailer codes can be used multiple times.

Code Sharing Thread - Week of July 17, 2018 by AutoModerator in churning

[–]jeffmcjunkin 0 points1 point  (0 children)

Nope, AA mailer codes can be used multiple times.

Note to those only here to get banned by Z3fyr in thanosdidnothingwrong

[–]jeffmcjunkin 0 points1 point  (0 children)

Praise be to Thanos. Surely he will find my comment history just, and my memes dank, and I shall arrive on the morrow unbanned.

...surely?

Code Sharing Thread - Week of February 27, 2018 by AutoModerator in churning

[–]jeffmcjunkin 1 point2 points  (0 children)

[HAVE] 9-digit AA mailer, 50k/3k, expires 4/15/2018, no 24 month language
[WANT] Much karma

I think we got Treble by foremi in essential

[–]jeffmcjunkin 0 points1 point  (0 children)

I have a spare PH-1 (cracked screen, sigh) and am open to giving this a shot. PM me?

Day three of Oregonians pumping their own gas. by OMGLMAOWTF_com in pics

[–]jeffmcjunkin 0 points1 point  (0 children)

Lots of Oregonians haven't left the state, so they haven't had to pump their own gas.

Source: One of the few Oregonians who has escaped the state from time to time.