|
1 | 1 | # Reference Archiver Results |
2 | 2 |
|
3 | | -Last Execution: 2023-11-15 01:55:35 |
| 3 | +Last Execution: 2023-12-01 01:52:33 |
4 | 4 |
|
5 | 5 | ### Archiver Script Results |
6 | 6 |
|
7 | 7 |
|
8 | 8 | #### Newly Archived References |
9 | 9 |
|
10 | | -- https://github.com/AliBrTab/CVE-2023-46747-POC/tree/main |
| 10 | +N/A |
11 | 11 |
|
12 | 12 | #### Already Archived References |
13 | 13 |
|
14 | | -- https://posts.specterops.io/application-whitelisting-bypass-and-arbitrary-unsigned-code-execution-technique-in-winrm-vbs-c8c24fb40404 |
15 | | -- https://www.virustotal.com/gui/file/b6e8910fb9b3bb1fcddefd35ff0ed8624930d30d6977e11808c8330415685a62 |
16 | | -- https://www.virustotal.com/gui/file/72f1a5476a845ea02344c9b7edecfe399f64b52409229edaf856fcb9535e3242 |
17 | | -- https://lolbas-project.github.io/lolbas/Binaries/msedge_proxy/ |
18 | | -- https://github.com/0xorOne/nuclei-templates/blob/2fef4270ec6e5573d0a1732cb18bcfc4b1580a88/http/cves/2023/CVE-2023-46747.yaml |
19 | | -- https://learn.microsoft.com/en-us/office/vba/api/excel.xlmsapplication |
20 | | -- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes |
21 | | -- https://community.f5.com/t5/technical-forum/running-bash-commands-via-rest-api/td-p/272516 |
22 | | -- https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification |
| 14 | +- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662 |
| 15 | +- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Msxsl/ |
| 16 | +- https://www.huntress.com/blog/confluence-to-cerber-exploitation-of-cve-2023-22518-for-ransomware-deployment |
23 | 17 |
|
24 | 18 | #### Error While Archiving References |
25 | 19 |
|
26 | | -- https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html |
27 | | -- https://news.ycombinator.com/item?id=29504755 |
28 | | -- https://us-cert.cisa.gov/ncas/alerts/aa21-008a |
29 | | -- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/ |
30 | | -- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/ |
| 20 | +- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/ |
31 | 21 | - https://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin |
32 | | -- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195 |
33 | | -- https://us-cert.cisa.gov/ncas/alerts/aa21-259a |
34 | | -- http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/ |
35 | | -- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/ |
36 | | -- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/ |
37 | | -- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/ |
38 | | -- https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922 |
39 | | -- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/ |
40 | | -- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ |
41 | | -- https://www.cyberciti.biz/faq/linux-remove-user-command/ |
42 | | -- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/ |
43 | | -- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/ |
44 | | -- https://paper.seebug.org/1495/ |
45 | | -- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/ |
| 22 | +- https://news.ycombinator.com/item?id=29504755 |
| 23 | +- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/ |
46 | 24 | - https://megatools.megous.com/ |
47 | | -- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/ |
| 25 | +- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/ |
| 26 | +- https://www.sans.org/cyber-security-summit/archives |
| 27 | +- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/ |
48 | 28 | - https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks |
49 | | -- http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/ |
50 | | -- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992 |
51 | | -- https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html |
| 29 | +- https://www.cyberciti.biz/faq/linux-remove-user-command/ |
| 30 | +- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/ |
| 31 | +- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ |
| 32 | +- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/ |
| 33 | +- http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/ |
52 | 34 | - https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a |
| 35 | +- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode |
| 36 | +- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100 |
| 37 | +- https://github.com/grayhatkiller/SharpExShell |
| 38 | +- https://petrusviet.medium.com/dancing-on-the-architecture-of-vmware-workspace-one-access-eng-ad592ae1b6dd |
| 39 | +- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 |
| 40 | +- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/ |
| 41 | +- https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html |
| 42 | +- https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e |
53 | 43 | - https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers-imaploader-malware.html |
54 | | -- https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html |
| 44 | +- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/ |
| 45 | +- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization |
| 46 | +- https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1 |
55 | 47 | - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations |
56 | | -- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/ |
| 48 | +- https://learn.microsoft.com/en-us/windows/win32/wmisdk/connecting-to-wmi-remotely-starting-with-vista |
| 49 | +- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/ |
| 50 | +- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ |
| 51 | +- https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747/ |
| 52 | +- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/ |
| 53 | +- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/ |
| 54 | +- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/ |
| 55 | +- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/ |
| 56 | +- https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 |
57 | 57 | - https://github.com/fortra/impacket/blob/33058eb2fde6976ea62e04bc7d6b629d64d44712/examples/smbexec.py#L286-L296 |
| 58 | +- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd |
58 | 59 | - https://community.f5.com/t5/technical-forum/icontrolrest-11-5-execute-bash-command/td-p/203029 |
59 | | -- https://www.sans.org/cyber-security-summit/archives |
60 | | -- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/ |
| 60 | +- https://github.com/fortra/impacket/blob/edef71f17bc1240f9f8c957bbda98662951ac3ec/examples/smbexec.py#L60 |
| 61 | +- https://linux.die.net/man/8/useradd |
| 62 | +- https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/ |
| 63 | +- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf |
| 64 | +- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/ |
| 65 | +- https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b |
| 66 | +- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195 |
| 67 | +- https://github.com/ForceFledgling/CVE-2023-22518 |
| 68 | +- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html |
| 69 | +- https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html |
| 70 | +- https://linux.die.net/man/1/arecord |
61 | 71 | - https://www.hexacorn.com/blog/2017/01/14/beyond-good-ol-run-key-part-53/ |
62 | | -- https://www.virustotal.com/gui/file/d72af640b71b8e3eca3eba660dd7c7f029ff8852bcacaa379e7b6c57cf4d9b44 |
63 | | -- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx |
64 | | -- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/ |
| 72 | +- https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922 |
65 | 73 | - https://www.cyberciti.biz/faq/how-force-kill-process-linux/ |
66 | | -- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd |
67 | | -- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/ |
| 74 | +- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/ |
| 75 | +- https://paper.seebug.org/1495/ |
| 76 | +- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/ |
| 77 | +- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf |
68 | 78 | - https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash |
69 | | -- https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b |
70 | | -- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/ |
| 79 | +- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992 |
| 80 | +- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/ |
| 81 | +- https://www.group-ib.com/resources/threat-research/red-curl-2.html |
| 82 | +- https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/ |
| 83 | +- https://us-cert.cisa.gov/ncas/alerts/aa21-008a |
| 84 | +- http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/ |
| 85 | +- https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html |
| 86 | +- https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html |
| 87 | +- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/ |
| 88 | +- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/ |
| 89 | +- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/ |
| 90 | +- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/ |
| 91 | +- http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/ |
71 | 92 | - http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/ |
72 | | -- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf |
73 | | -- https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 |
74 | | -- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100 |
75 | | -- https://github.com/grayhatkiller/SharpExShell |
76 | | -- https://github.com/api0cradle/LOLBAS/blob/d148d278f5f205ce67cfaf49afdfb68071c7252a/OSScripts/pester.md |
77 | | -- https://petrusviet.medium.com/dancing-on-the-architecture-of-vmware-workspace-one-access-eng-ad592ae1b6dd |
| 93 | +- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/ |
| 94 | +- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx |
| 95 | +- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/ |
78 | 96 | - https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/ |
79 | | -- https://linux.die.net/man/1/arecord |
80 | | -- http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/ |
81 | | -- https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/ |
82 | | -- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/ |
| 97 | +- https://www.virustotal.com/gui/file/d72af640b71b8e3eca3eba660dd7c7f029ff8852bcacaa379e7b6c57cf4d9b44 |
| 98 | +- https://github.com/api0cradle/LOLBAS/blob/d148d278f5f205ce67cfaf49afdfb68071c7252a/OSScripts/pester.md |
83 | 99 | - https://mp.weixin.qq.com/s/wUoBy7ZiqJL2CUOMC-8Wdg |
84 | | -- https://github.com/fortra/impacket/blob/edef71f17bc1240f9f8c957bbda98662951ac3ec/examples/smbexec.py#L60 |
85 | | -- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/ |
86 | | -- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 |
87 | | -- https://learn.microsoft.com/en-us/windows/win32/wmisdk/connecting-to-wmi-remotely-starting-with-vista |
88 | | -- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html |
89 | | -- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Msxsl/ |
90 | | -- https://linux.die.net/man/8/useradd |
91 | | -- https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1 |
92 | | -- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/ |
93 | | -- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ |
94 | | -- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf |
95 | | -- https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747/ |
96 | | -- https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e |
97 | | -- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization |
98 | | -- https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/ |
99 | | -- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/ |
100 | | -- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode |
101 | | -- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/ |
| 100 | +- https://us-cert.cisa.gov/ncas/alerts/aa21-259a |
| 101 | +- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/ |
102 | 102 | - https://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver/ |
103 | | -- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/ |
104 | | -- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/ |
105 | | -- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/ |
106 | | -- https://www.group-ib.com/resources/threat-research/red-curl-2.html |
107 | | -- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662 |
108 | | -- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/ |
0 commit comments