Riello UPS Restricted Shell Bypass
During a pentest we found Riello UPS systems can have their restricted configuration shell bypassed to gain full underlying operating system access.
Pentester | OSCE(3) CRTM CRTL GXPN GRTP
During a pentest we found Riello UPS systems can have their restricted configuration shell bypassed to gain full underlying operating system access.
Code snippet to create a process using the PROCESS_CREATION_MITIGATION_POLICY_BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON flag, which blocks 3rd party DLLs to be injected in it (such as EDR DLLs).
Weblogic servers are popular in pentests as outdated versions have RCE vulnerabilities with public exploits. However, you can exploit them uploading WAR files as well.
Exploiting iDRACs is a common practice in pentests as compromising one allows to also compromise the system controlled by the iDRAC. However, it is not so immediate to exploit old iDRAC versions nowadays as it was some years ago.
Short guide to solve this problem using Github API
With this script it is possible to extract Active Directory accounts’ hashes when credential caching is enabled in the SSSD service.
Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram using Python to create the files and the listeners. It allows to create text files, images, audio or videos, with the commands in cleartext or encrypted using AES.