Open in app

Sign in

Write

Sign in

rootsecdev
rootsecdev

885 followers

Home

About

Notes From The Field: Exploiting Nagios XI SQL Injection (CVE-2023–40931)

This CVE affects Nagios XI 5.11.0 and 5.11.1. It does require authenticated access into the Nagios environment.

Jul 4, 2024
Notes From The Field: Exploiting Nagios XI SQL Injection (CVE-2023–40931)
Notes From The Field: Exploiting Nagios XI SQL Injection (CVE-2023–40931)
Jul 4, 2024

Introduction to Azure Cloud Token Theft MindMap V1

Recently I’ve uploaded a Mind Map to my Azure Red Team repository on Token theft decisioning during authorized penetration test or red team…

Jun 12, 2024
1
Jun 12, 2024
1

Evading Token Protection For EntraID/M365 (2024 Edition)

The topic of using token protection has cropped up on my timeline again recently, so I thought it was necessary to do an updated post on…

May 27, 2024
Evading Token Protection For EntraID/M365 (2024 Edition)
Evading Token Protection For EntraID/M365 (2024 Edition)
May 27, 2024

Notes From the Field: Hacking Jenkins CVE-2024–23897

Feb 19, 2024
Notes From the Field: Hacking Jenkins CVE-2024–23897
Notes From the Field: Hacking Jenkins CVE-2024–23897
Feb 19, 2024

Updated: Adversary Simulation using Azure CLI and Microsoft Graph PowerShell

At one point last year prior to things like GraphRunner coming out, operations to interact with Microsoft Graph PowerShell was a common…

Feb 15, 2024
Updated: Adversary Simulation using Azure CLI and Microsoft Graph PowerShell
Updated: Adversary Simulation using Azure CLI and Microsoft Graph PowerShell
Feb 15, 2024

Active Authentication Administrators in Azure

I had this question come up again recently. What are “Active Authentication Administrators” and why are they showing up under regular…

Feb 1, 2024
1
Active Authentication Administrators in Azure
Active Authentication Administrators in Azure
Feb 1, 2024
1

Pentesting with Secure LDAP and LDAP Channel Binding

Dec 8, 2023
3
Pentesting with Secure LDAP and LDAP Channel Binding
Pentesting with Secure LDAP and LDAP Channel Binding
Dec 8, 2023
3

Notes: Manual Exploitation of Atlassian Confluence

Verify Version

Nov 11, 2023
Notes: Manual Exploitation of Atlassian Confluence
Notes: Manual Exploitation of Atlassian Confluence
Nov 11, 2023

Azure AD Security Defaults/MFA Bypass with Graph API

Aug 24, 2023
Azure AD Security Defaults/MFA Bypass with Graph API
Azure AD Security Defaults/MFA Bypass with Graph API
Aug 24, 2023

Hacking Active Directory with Sliver C2

This box (Access) is well known (or atleast should be) in Offsec Proving grounds. I decided to revisit this active directory box as a…

Jul 16, 2023
1
Hacking Active Directory with Sliver C2
Hacking Active Directory with Sliver C2
Jul 16, 2023
1
rootsecdev

rootsecdev

885 followers

Hacking mostly clouds

Following
  • Sam Rothlisberger

    Sam Rothlisberger

  • The Medium Blog

    The Medium Blog

  • Andy Robbins

    Andy Robbins

  • Suleika Jaouad

    Suleika Jaouad

  • Seth Abramson

    Seth Abramson

See all (128)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech