/r/netsec Profile
/r/netsec

@_r_netsec

28,419
Followers
1
Following
29
Media
14,748
Statuses

Follow for new posts submitted to the netsec subreddit. Unofficial.

[root@netsec /]#
Joined November 2014
Don't wanna be here? Send us removal request.
Pinned Tweet
@_r_netsec
/r/netsec
1 year
0
4
11
@_r_netsec
/r/netsec
4 years
Upload htaccess as image to bypass filters ..nice read
1
221
563
@_r_netsec
/r/netsec
2 years
Shiba Inu Crypto cloud credentials leaked on a public repository!
0
6
20
@_r_netsec
/r/netsec
4 years
Shodan Hacking Guide
0
184
410
@_r_netsec
/r/netsec
3 years
New LSASS Dumping Method via SilentProcessExit
3
190
384
@_r_netsec
/r/netsec
4 years
Bypass Windows 10 User Group Policy (and more) with this One Weird Trick
2
162
378
@_r_netsec
/r/netsec
4 years
Extracting Kerberos tickets from network traffic - BruteShark (v1.0.5) is now capable of extracting Kerberos tickets and convert them to Hashcat format
0
145
358
@_r_netsec
/r/netsec
5 years
I recently setup a RDP honeypot and it didn’t disappoint. The first actor that logged in disabled or broke AV/logging/Task Manager/ etc. via a bat file. Then they dropped two RDP brute forcing tools and a GUI for Massscan. See the full write-up below.
6
125
343
@_r_netsec
/r/netsec
5 years
JWT (in)security write-up
0
128
327
@_r_netsec
/r/netsec
2 years
How to master Google Hacking (Dorking)
2
99
289
@_r_netsec
/r/netsec
4 years
From fuzzing to remote code execution in Samsung Android
1
120
289
@_r_netsec
/r/netsec
3 years
When hacking Windows machines, I get tired of constantly googling commands or scrolling through cheat sheets. So to fix that, I made WADComs! It's an interactive cheat sheet for Windows/AD commands with filters. Please contribute your own commands too!
2
95
283
@_r_netsec
/r/netsec
4 years
An attacker logged into the RDP Honeypot a few weeks ago and was able to dump credentials and move laterally in 36 minutes. They used Advanced Scanner + ProcDump + PsExec to move laterally to a Domain Controller. Would you have detected and responded...
5
119
275
@_r_netsec
/r/netsec
4 years
SSH Pentesting Guide
1
61
268
@_r_netsec
/r/netsec
3 years
How I stole the data of people’s Google accounts (misusing the Google master token)
4
114
258
@_r_netsec
/r/netsec
4 years
Offensive Security Exam Report Template in Markdown (for OSCP OSWE OSCE OSEE OSWP)
0
74
247
@_r_netsec
/r/netsec
5 years
A/V | EDR evasion using a RAMDisk and a custom PE loader
1
106
241
@_r_netsec
/r/netsec
4 years
Hardcoded secrets, unverified tokens, and other common JWT mistakes
1
100
236
@_r_netsec
/r/netsec
7 months
BugBountyGPT - Now GPT helps to find vulnerabilities!
2
58
222
@_r_netsec
/r/netsec
3 years
Yet another PHP 7.0-8.0 disable_functions bypass 0day PoC
0
79
212
@_r_netsec
/r/netsec
4 years
HTTP Request Smuggling + IDOR
2
83
204
@_r_netsec
/r/netsec
5 years
JWT Attack Playbook (for methodical pentesting)
0
83
208
@_r_netsec
/r/netsec
4 years
Remove duplicates from MASSIVE wordlist, without sorting it (for dictionnary-based password cracking)
0
84
203
@_r_netsec
/r/netsec
5 years
Living Off the Land with Windows binaries - Practical Examples
0
68
205
@_r_netsec
/r/netsec
4 years
From S3 bucket to Laravel unserialize RCE
0
98
197
@_r_netsec
/r/netsec
4 years
A Collection of Cloud Security Tools
1
59
198
@_r_netsec
/r/netsec
2 years
AWS Cloud Security Challenges
0
72
196
@_r_netsec
/r/netsec
2 years
Wireless Penetration Testing complete Repo
8
84
194
@_r_netsec
/r/netsec
4 years
CVE-2020-8816 – Pi-hole Remote Code Execution – Detailed write-up about the vulnerability and exploitation proof of concept
5
109
196
@_r_netsec
/r/netsec
4 years
ENISA's free cyber security courses (foresics, malware, incident management...)
1
70
195
@_r_netsec
/r/netsec
3 years
The Security Engineer Handbook
0
45
189
@_r_netsec
/r/netsec
5 years
Invoke-ReverseSocksProxy: A powershell based SSL tunnel to pivot into internal networks through system proxies.
0
74
188
@_r_netsec
/r/netsec
4 years
Evasion techniques - Malware Evasion Encyclopedia, which contains over 50 techniques used by various malwares to detect virtualized and sandboxed environments.
0
76
187
@_r_netsec
/r/netsec
5 years
Windows 10 - Task Scheduler service - Privilege Escalation/Persistence through DLL planting/hijacking
0
99
183
@_r_netsec
/r/netsec
4 years
GGvulnz — How I hacked hundreds of companies through Google Groups
2
65
182
@_r_netsec
/r/netsec
5 years
Buffer overflow in proftpd
2
68
181
@_r_netsec
/r/netsec
2 years
[CVE-2022-34918] A crack in the Linux firewall
0
67
178
@_r_netsec
/r/netsec
4 years
TeamViewer stored user passwords encrypted, not hashed, and the key is now public
0
140
180
@_r_netsec
/r/netsec
2 years
ThePhish is an open-source tool that automates the entire phishing email analysis process starting from the extraction of the observables from the header and the body of an email to the elaboration of a verdict which is final in most cases. It is based on
0
56
177
@_r_netsec
/r/netsec
4 years
Blind SQL Injection without an “in”
5
72
168
@_r_netsec
/r/netsec
4 years
Ciphey - Decrypt without knowing the key or encryption used.
0
69
175
@_r_netsec
/r/netsec
2 years
Decrypting your own HTTPS traffic with Wireshark
0
58
170
@_r_netsec
/r/netsec
2 years
The Automated Penetration Testing Reporting System (APTRS). Pentester can easily maintain projects, customers, and vulnerabilities, and create PDF reports without needing to use traditional DOC files. The tool allows you to maintain a vulnerability databas
1
62
172
@_r_netsec
/r/netsec
2 years
log4hshell - Quick Guide
2
54
163