May 24, 2022 at 10:02AM

■■■□□ Remotely take over Workstations (Windows 7/10/11) and possibly servers (if Desktop Experience is installed) when their WebClient service is running. https://gist.github.com/gladiatx0r/1ffe59031d42c08603a3bde0ff678feb https://t.me/cKure/11380

May 23, 2022 at 11:49PM

■■■□□ BloodHound Inner Workings & Limitations – Part 1: User Rights Enumeration Through SAMR & GPOLocalGroup. https://blog.compass-security.com/2022/05/bloodhound-inner-workings-part-1/ https://t.me/cKure/11379

May 21, 2022 at 01:14PM

■■■■□ Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit. https://thehackernews.com/2022/05/web-trackers-caught-intercepting-online.html https://t.me/cKure/11376

May 21, 2022 at 10:12AM

■■■■□ CVE-2021-22573: High-Severity Bug Reported in Google’s OAuth Client Library for Java. https://thehackernews.com/2022/05/high-severity-bug-reported-in-googles.html https://t.me/cKure/11375

May 21, 2022 at 02:55AM

■■■□□ IMAP Password lying out there in Registry in DPAPI-encrypted form. Worth adding Seatbelt collection support? 🙂 HKLM\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Simple CryptUnprotectData() will do to decrypt it. Source: https://twitter.com/mariuszbit/status/1527422972285403139 https://t.me/cKure/11374