Tweetovi

Blokirali ste korisnika/cu @buffaloverflow

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @buffaloverflow

  1. 14. sij

    Notes on how NetScaler passwords are hashed. (But don't use my crappy rule now has added support 😊)

    Poništi
  2. 14. sij

    Ok AES-256 encrypted LDAP passwords in ns.conf in ADC/NetScaler have been broken. You need to change those too.

    Poništi
  3. proslijedio/la je Tweet
    14. sij
    Odgovor korisnicima

    This is how is used to be done, IIRC theyve changed it since 10.5 at some point. Easier way is to copy the encrypted value into your own local Netscaler and just set it to auth against a ncat listener or something

    Poništi
  4. 13. sij

    If you see the attacker reading /var/nstmp/sess_* then they just stole authenticated cookies which can be re-used

    Prikaži ovu nit
    Poništi
  5. 13. sij

    CVE-2019-19781 post-exploitation notes: If you are seeing attackers reading your /flash/nsconfig/ns.conf file then you need to change all passwords. The SHA512 passwords are easily crackable with hashcat.

    Prikaži ovu nit
    Poništi
  6. 13. sij

    Dear followers, please can someone with a known vulnerable NetScaler run this check for me? Make the following request against the VIP (not management interface): POST /vpns/portal/scripts/newbm.pl

    Poništi
  7. 12. sij

    Odd thing about some of the Citrix ADC/NetScaler exploits/scanners.. the ones written in python use the requests module, which normalizes the path so /vpn/../vpns/ => /vpns/ Does that mean people are getting false negatives on the vuln check, or that /../ is really not needed?

    Poništi
  8. 11. sij

    And (I cant believe anyone would do this, but) if you expose your management interface to the internet, don't bother looking for ../ in the request path. It can be exploited without traversal. Just apply the mitigation and go enjoy your weekend 😉

    Poništi
  9. 11. sij

    RE: CVE-2019-19781 detections (Citrix NetScaler/ADC RCE) Although the vulnerable code mandates the the first request *must* be a POST request - the second request can be a HEAD or even a PUT and will still get processed by the template engine.

    Poništi
  10. proslijedio/la je Tweet
    11. sij

    Multiple exploits were released overnight for CVE-2019-19781 in Citrix ADC/Netscaler - we should all prepare for mass exploitation by a variety of actors as we saw with the various VPN issues last year - details here:

    Poništi
  11. 10. sij

    Been running a honeypot for this bug for a few days now. Last 24 hours there has been an increase in internet wide scanning

    Poništi
  12. 10. sij

    Detection: Exploited with 1 POST + 1 GET reqest. As mentioned before, you can look for "/vpns/" in the path, but also "../" in header values for the POST. Probably shouldn't say *which* header at this point. This will be followed by a GET request for a file ending in ".xml".

    Poništi
  13. 10. sij

    Exploit for Citrix NetScaler CVE-2019-19781. Very interesting bug(s)! 'touch /tmp/CVE-2019-19781' because I'm lazy/busy 😉

    Poništi
  14. 1. sij

    Legit just got my first "happy 50th birthday" email. Happy birthday y'all 😅🥳

    Poništi
  15. 30. lis 2019.

    Really enjoyed the livestream coverage that I got to see. Hoping to catch up when I have some free time.

    Poništi
  16. 30. lis 2019.

    Thanks Humbled 🙏 I always dreamed about what it would be like to maybe win one of these someday! Imma let you finish.. but, Nick shares the spiciest tweets of all time! 🏆🌶

    Poništi
  17. 26. lis 2019.
    Poništi
  18. 14. lis 2019.

    Saw some peeps saying this doesn't work anymore... it does! Maybe you are just getting tripped up by Defender emulation (Foretype anyone? 🙃). All I can say is, make sure you've checked out 's truly excellent Defender research 👍

    Poništi
  19. proslijedio/la je Tweet
    7. lis 2019.

    Just merged PR into master. Nice feature, thanks a lot Rich!

    Poništi
  20. 30. ruj 2019.

    Added support for SMB2 snapshot listing/browsing/downloading to impacket. Cool feature for dumping NTDS etc. over pure SMB

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·