{"uuid": "3f391e62-8a99-4858-8ba2-959afedb9e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-26855", "type": "exploited", "source": "https://t.me/dc7342/48457", "content": "INCEPTION #6  - \u044d\u0442\u043e \u0446\u0435\u043b\u043e\u0435 \u0441\u043e\u0431\u044b\u0442\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0430\u043d\u0434\u0435\u0433\u0440\u0430\u0443\u043d\u0434\u0430, \u0447\u0438\u0442\u0430\u0442\u044c \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e !\n\u0432 \u043d\u043e\u043c\u0435\u0440\u0435:\n   1.  CobaltStrike \u043e\u0442 \u0410 \u0434\u043e \u042f. \n   2.  \u0420\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u044b\u0435 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u044b \u0432 \u041e\u0421 \u0441\u0435\u043c\u0435\u0439\u0441\u0442\u0432\u0430 Windows. \u041c\u0435\u0442\u043e\u0434\u0438\u043a\u0430 \u0438 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u0440\u0438\u043c\u0435\u0440. \n    3.  ProxyLogon &amp; CVE-2021-26855.\n    4.  How I exploited this corporation for $100k in 7 days. \n    5.  \u0412\u044b \u0434\u0443\u043c\u0430\u043b\u0438, \u044f \u0432\u0430\u0441 \u043d\u0435 \u043f\u0435\u0440\u0435\u0438\u0433\u0440\u0430\u044e? \n    6.  \u041a\u0430\u043a \u044f \u043f\u043e\u043a\u0430\u0437\u0430\u043b \u043f\u043e\u0440\u043d\u0443\u0445\u0443 \u0432 Hilton &amp; 0day \u0432 Dish. \n    7.  HVNC \u0447\u0430\u0441\u0442\u044c 1: dll-hijacking, hooks, rat.", "creation_timestamp": "2022-02-05T04:06:36.000000Z"}