CYBER MONGOL
  • ASATA
  • Our Journey
  • Intelligence Engine
  • Human-Machine Teaming
  • Operator Research
  • Achievements and Media
  • Counter Intelligence
  • ASATA
  • Our Journey
  • Intelligence Engine
  • Human-Machine Teaming
  • Operator Research
  • Achievements and Media
  • Counter Intelligence
Search by typing & pressing enter

YOUR CART

3/21/2021 0 Comments

F5 Big IP CVE-2021-22986 RCE Exploit Being Added to Attack Frameworks

Picture
​*F5 Big IP CVE-2021-22986 RCE Exploit Being Added to Attack Frameworks* Sensors started seeing human momentum behind a framework meant to exploit public-facing applications (T1190). It looks like an RCE for CVE-2021-22986 was just added but we can’t confirm this by looking at the source, as just a precompiled binary is provided, and we have not tested the binary. None the less, this type of integration signals to widespread adoption and misuse of this exploit. Lastly, this framework claims to target the recent vCenter (CVE-2021-21972) exploit as well, which our sensors have registered heavy human momentum behind.
 
Anonymous-ghost/AttackWebFrameworkTools: https://github.com/Anonymous-ghost/AttackWebFrameworkTools
 
#infosec #cybersecurity #informationsecurity #threatintelligence #networksecurity #sec #security #tools #offensivesecurity #pentesting #redteam #blueteam
 
0 Comments

3/17/2021 0 Comments

WARNING F5 Big IP (CVE-2021-22986) unauthenticated RCE

Picture
​*WARNING F5 Big IP (CVE-2021-22986) unauthenticated RCE* Sensors are seeing activity (PoC development and patch reverse engineering) behind CVE-2021-22986 which is an unauthenticated RCE (we all knew this was coming) targeting F5 Big IP. Besides a PoC, the repo offers a complete patch analysis in pdf as well. This exploit belongs to a social structure of medium amplification so in our opinion, it will spur other activity.
 
PoC: https://github.com/dorkerdevil/CVE-2021-22986-Poc
 
 
#infosec #cybersecurity #informationsecurity #threatintelligence #networksecurity #sec #security #tools #offensivesecurity #pentesting #redteam #blueteam
0 Comments

3/11/2021 0 Comments

WARNING: PoC of Proxylogon chain SSRF(CVE-2021-26855) to write file

Picture
*WARNING: PoC of Proxylogon chain SSRF(CVE-2021-26855) to write file* Sensors have detected a PoC for Proxylogon chain SSRF(CVE-2021-26855) to write file. Sensors are also seeing a high number of repos trying to publish this exploit code, battling with GitHub who is actively killing the repos as they go up.
 
Repos (if they are still up):
 
Proxylogon chain SSRF(CVE-2021-26855) to write file: https://github.com/raheel0x01/CVE-2021-26855/blob/main/POC_of_proxylogonchain.py
 
PoC_proxyLogon[.]py: https://github.com/hackerschoice/CVE-2021-26855/blob/main/PoC_proxyLogon.py
 
#infosec #cybersecurity #informationsecurity #threatintelligence #networksecurity #sec #security #tools #offensivesecurity #pentesting #redteam #blueteam
0 Comments

3/6/2021 0 Comments

WARNING (1 hour ago) CVE-2021-26855: Exchange SSRF

Picture
*WARNING (1 hour ago) CVE-2021-26855: Exchange SSRF* Sensors are starting to see parts of the recent Exchange exploit chain become publicly available.
 
CVE-2021-26855: Exchange SSRF: https://github.com/Udyz/CVE-2021-26855-SSRF-Exchange
 
MS technical Details: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers
 
#infosec #cybersecurity #informationsecurity #threatintelligence #networksecurity #sec #security #tools #offensivesecurity #pentesting #redteam #blueteam

0 Comments

3/3/2021 0 Comments

Advanced Russian OSINT Tool: Heavy Sensor Activity

Picture
Sensors have seen continuous human momentum behind Bafomet666/OSINT-SAN, advanced Russian OSINT tool. Within our database, this signal ranks 140/5389 for most all-time sensor hits (raw human momentum). The tool is also connected to a Telegram channel that has impactful social reach in itself.  
 
Bafomet666/OSINT-SAN: Bafomet666/OSINT-SAN: Framework для сбора данных и информации из открытых источников, но есть инструменты поиска и брутфорса которые использовать нужно, только с разрешения владельца ресурса. В Framework используется небольшое количество API. Вам необходимо их зарегистрировать самому.​ (github.com)
 
Telegram Channel: Bafomet dev – Telegram
 
#infosec #cybersecurity #informationsecurity #threatintelligence #networksecurity #sec #security #tools #offensivesecurity #pentesting #redteam #blueteam
0 Comments

    Archives

    July 2021
    June 2021
    May 2021
    March 2021
    February 2021
    January 2021

    RSS Feed

contact us:
© COPYRIGHT 2015. ALL RIGHTS RESERVED.