Base64 Code | Mnemonic Aid | Decoded* | Description |
---|---|---|---|
JAB |
🗣 Jabber | $. |
Variable declaration (UTF-16), e.g. JABlAG4AdgA for $env: |
TVq |
📺 Television | MZ |
MZ header |
SUVY |
🚙 SUV | IEX |
PowerShell Invoke Expression |
SQBFAF |
🐣 Squab favorite | I.E. |
PowerShell Invoke Expression (UTF-16) |
SQBuAH |
🐣 Squab uahhh | I.n. |
PowerShell Invoke string (UTF-16) e.g. Invoke-Mimikatz |
PAA |
💪 "Pah!" | <. |
Often used by Emotet (UTF-16) |
0059.co.kr | |
007.no | |
007airsoft.com | |
008.vista.kz | |
01186mb.ca | |
012.ca | |
01nii.ru | |
0286776498.com | |
0286780777.com | |
02asat.photoherald.com |
In the default configuration of Active Directory, it is possible to remotely take over Workstations (Windows 7/10/11) and possibly servers (if Desktop Experience is installed) when their WebClient service is running. This is accomplished in short by;
- Triggering machine authentication over HTTP via either MS-RPRN or MS-EFSRPC (as demonstrated by @tifkin_). This requires a set of credentials for the RPC call.
- Relaying that machine authentication to LDAPS for configuring RBCD
- RBCD takeover
The caveat to this is that the WebClient service does not automatically start at boot. However, if the WebClient service has been triggered to start on a workstation (for example, via some SharePoint interactions), you can remotely take over that system. In addition, there are several ways to coerce the WebClient service to start remotely which I cover in a section below.
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
- If you want to add a link, comment or send it to me
- Feel free to report any mistake directly below in the comment or in DM on Twitter @SwitHak
- Royce Williams list sorted by vendors responses Royce List
- Very detailed list NCSC-NL
- The list maintained by U.S. Cybersecurity and Infrastructure Security Agency: CISA List
Solution 1
I was not able to run podman stats
on RHEL8. The command returned:
Error: stats is not supported in rootless mode without cgroups v2
Solution based on this article -> https://sleeplessbeastie.eu/2021/09/10/how-to-enable-control-group-v2/
<% tp.user.cve_details(cve_id) %>
Role: Jsi zkušený inženýr promptů pro ChatGPT-4o a striktně dodržuješ oficiální pokyny, doporučení a best practices OpenAI pro tvorbu promptů. Úkol: Jakmile ti předám hrubý nápad nebo cíl, převeď jej na co nejúčinnější prompt pro ChatGPT-4o.
Kontrolní pravidlo (NEPŘESKAKUJ): Pokud aktuální zpráva uživatele neobsahuje jasně vymezený hrubý nápad / cíl, odpověz jedinou stručnou otázkou typu „Jaký hrubý nápad nebo cíl chcete proměnit v prompt?“ a vyčkej na odpověď. Nesmíš si žádný nápad domýšlet ani generovat.
⸻
<role> | |
You are a Zettelkasten note-taking assistant specialized in creating atomic notes for Obsidian. Your expertise includes concept decomposition, research verification, and creating properly formatted notes as artifacts. | |
</role> | |
<capabilities> | |
- Analyze topics for atomic decomposition | |
- Search for and cite reliable sources | |
- Create notes as copyable artifacts | |
- Refine notes through iterative updates | |
- Acknowledge uncertainty appropriately |