Since 2015 when java deserialization was a major threat, lots of patches and improvements has been introduced. How to approach testing for java serialization to achieve best results? How do you use ysoserial properly? Learn it from the below article.

The article is based on talks I gave recently on Polish conferences — OhMyHack, The Hack Summit and also OWASP Poland online meetup.

There was not any new technique discovered, but I rather made a summary of current “state of art”. Moreover, I performed some reading of Ysoserial’s source code to see how each payload is meant to work, which…

This is the second part of the “Java RMI for pentesters” article. The first part can be found here and you can learn from it what are Java RMI registries (I am mainly speaking about non-JMX ones) and how to interact with them.

In the current part we will talk about actual automated reconnaissance as well as attacks against them. The article will make use of RMI interface / server which was presented and thoroughly explained in the first part. Its source code can also be found on GitHub, here.

Reconaissance

A RMIRegistry server is started as per the part one…

Post ten jest kontynuacją pierwszej części, w której omówiliśmy dwie techniki zapewnienia sobie stałego dostępu do systemu windows: poprzez usługi (services) oraz poprzez zaplanowane zadania (scheduled tasks).

Kolejną lokalizacją, w której może zostać ukryty backdoor, jest Rejestr systemu Windows. Rejestr systemu Windows pełni rolę bazy danych dla krytycznych metadanych systemu — w związku z tym zawiera takie informacje jak np. to, jakie pliki wykonywalne powiązane są z usługami, jakie programy powinny wystartować wraz z zalogowaniem się użytkownika, skojarzenia rozszerzeń plików z programami i wiele innych interesujących opcji, które mogą zostać wykorzystane do osadzenia złośliwego kodu. Oczywiście poniżej opisane techniki to…

The purpose of this article is to explain to you, what are RMI interfaces you might encounter during penetration testing of infrastructure. Since the whole topic I’d like to cover is a bit long, I’ve split it into two parts. In the following part, I’ll just briefly explain what RMI interfaces are, how to create one for testing purposes and also how to build a RMI Client manually to invoke remote methods. The attack part will be described in the second part of this post, which can be found here.

Also, these articles are about native RMI registries. There are…

Niniejszy artykuł inspirowany jest prezentacją przedstawioną na śląskim meet-upie 1753C w styczniu 2020. W tej i kolejnych częściach, przedstawię Wam kilka przykładów backdoorów na systemach Windows — od najprostszych do trochę bardziej nietypowych. Sam backdoor, czyli z angielskiego „tylna furtka” to pewnego rodzaju ukryty kanał dostępu do jakiegoś zasobu cyfrowego — my skupimy się na dających dostęp do zbackdoorowanego systemu z poziomu reverse shella, pomijając takie aspekty jak dostępność sieciowa czy antywirus. Nie wykluczam jednak, że w przyszłości pojawi się artykuł obejmujący bardziej zaawansowane techniki ukrywania się na innym systemie. Backdoory przydają się podczas ćwiczeń ofensywnych, zwłaszcza w scenariuszach, w…

One December morning, I was delegated for a “quick” infrastructure test at the customer’s site. There were a lot of different hosts outside while inside there were a lot of Windows hosts entwined in a beautiful AD structure.

After getting inside and taking over the first machine, I realized my level of confusion was too high. It’s not that I didn’t know what I wanted to do, just my AD knowledge was disordered in some logical way. The test ended with taking over the domain, but it also cost a lot of time to rummage through the materials.

And here…

Introduction

Purpose of this short research was to determine possible solution to escalate from PostgreSQL privileged access to Code execution. PostgreSQL is known for its powerful file system interaction capabilities, however, the last version of it where SQLmap allowed to execute code was version 9, which was released before 2017. During penetration testing / security assessments, it is very likely that if you encounter a PostgreSQL database, it will be newer (as of 2020, current version is 12.x), which might lower your chances of executing code on the underlying operating system. …

AFINE

If you’re looking for the good guys who are ready and able to hack you, need look no further. We professionally find vulnerabilities before the bad guys do.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store