{"uuid": "248065f6-9458-46ed-8fb7-fa0f6f9a3065", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-42278", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanOfficial/301", "content": "#Tools -\u00a0 \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\nConnect\n\nCommand and Control Framework\n\nhttps://github.com/skylerknecht/connect\n\nPackMyPayload\n\nEmerging Threat of Containerized Malware\n\nThis tool takes a file or directory on input and embeds them into an output file acting as an archive/container. It can serve purpose for a Proof-of-Concept presenting emerging risk of container file formats with embedded malware, as well as helper for professional Red Team Operators to sharpen their Initial Access maneuvers.\n\nCurrently Threat Actors are known to smuggle their malware archived in various container file formats, to name a few:\n\n\u25ab\ufe0f 7zip\n\u25ab\ufe0f zip\n\u25ab\ufe0f ISO\n\u25ab\ufe0f IMG\n\nThey do that to get their payloads pass file content scanners, but more importantly to avoid having Mark-Of-The-Web flag on their files. There're various motives on why adversaries don't want MOTW on their files: Protected View in Microsoft Office was always among them.\n\nShould they provide container file to their victims, a foundation for disabling VBA macros in Internet-originated Office documents might be bypassed.\n\nhttps://github.com/mgeeky/PackMyPayload\n\nScoutSuite\n\nScout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, \n\nScout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents a clear view of the attack surface automatically.\n\n\u25ab\ufe0f https://github.com/nccgroup/ScoutSuite\n\u25ab\ufe0f https://github.com/nccgroup/sadcloud\n\nMsSettingsDelegateExecute\n\nBypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key. This visual studio project will compile a static x64 binary to test this issue.\n\nhttps://github.com/hackerhouse-opensource/MsSettingsDelegateExecute\n\niscsicpl_bypassUAC\n\nUAC bypass for x64 Windows 7-11\n\nhttps://github.com/zha0gongz1/iscsicpl_bypassUAC\n\nPico-PIO-USB.\n\nUSB host/device implementation using PIO of raspberry pi pico (RP2040).\n\nhttps://github.com/sekigon-gonnoc/Pico-PIO-USB\n\nserver-status PWN\n\nA script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-status instances.\n\nhttps://github.com/mazen160/server-status_PWN\n\nExploiting Misconfigured Apache server-status Instances with server-status_PWN:\nhttps://mazinahmed.net/blog/exploiting-misconfigured-apache-server-status-instances/\n\nChitchatter\n\nA free (as in both price and freedom) communication tool. It is designed with security and privacy in mind.\n\nhttps://github.com/jeremyckahn/chitchatter\n\nDemo:\nhttps://chitchatter.im/\n\nSwiss Cyber Defence\n\nExam Preparation for Cyber Security Specialist with Swiss Federal Diploma.\n\nhttps://github.com/phr85/swiss-cyber-defence\n\nnoPac\n\nExploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user\n\nhttps://github.com/Ridter/noPac\n\n#cve #exploit\n\nFsociety\n\nA Modular Penetration Testing Framework.\n\nhttps://github.com/fsociety-team/fsociety\n\nLORSRF\n\nlorsrf is just a web pen-testing tool that I wrote to find the parameters that can be used to find SSRF or Out-of-band resource load by adding OAST host like Burp Collaborator to the parameter value, above of all, the request that will be received in Burp Collaborator will be an HTTP request without any real pieces of information about the target, i was thinking about how can i get vulnerable parameter/endpoint , Hence i made a simple feature is that allowed you to add some pieces of information of the target in your OAST host as a variables\n\nhttps://github.com/knassar702/lorsrf\n\nEval 2 Term\n\nhttps://github.com/She11Way/eval2term\n\nJoin:\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory\n\nWebsite:\nwww.ghostclan.org\n\n#InsoSec #cybersec \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06", "creation_timestamp": "2023-03-22T10:44:27.000000Z"}