Almond OffSec

Offensive Security team at Almond

2024-12-09

To escape a locked-down Citrix environnement, team member SAERXCIT (twitter.com/SAERXCIT) wrote a basic shellcode loader in OpenEdge ABL, a 40 years old english-like programming language. We're sharing it in the off chance someone else might one day need it:

github.com/AlmondOffSec/OpenEd

2024-12-05

@sigabrt @yeswehack This issue was assigned CVE-2024-52531. While the CVE description states that the vulnerability cannot be reached from the network, it seems, in fact, possible (check the blogpost for details).

2024-10-30

Team member @sigabrt describes a fuzzing methodology he used to find a heap overflow in a public @yeswehack bug bounty program for Gnome: offsec.almond.consulting/using

2024-10-17

New article on F5! A write-up on CVE-2024-45844 a privilege escalation vulnerability in BIG-IP by team member @myst404
offsec.almond.consulting/privi

Screenshot of the original blog post
2024-09-27

If you are lucky enough to have a Windows Server Datacenter with Hyper-V, you can automatically activate @M4yFly 's GOAD VMs, so rebuilding the lab every 180 days is no longer needed. We POCed a Vagrant-style script here:

github.com/AlmondOffSec/GOAD_h

#GOAD #activedirectory #hyperv

2024-06-04

How does F5's Secure Vault, its "super-secure SSL-encrypted storage system" work? Response in this article by team member @myst404

offsec.almond.consulting/deep-

F5 BIG-IP unit key structure
2024-05-29

Got root, what now? Practical post-exploitation steps on an F5 Big-IP appliance, by team members @drm and @myst404

offsec.almond.consulting/post-

Decrypted TLS traffic within Wireshark window.
Almond OffSec boosted:
drmdrm
2024-03-21

Good news dear LDAP hackers 🎉 is now compatible with Channel Binding and LDAP Signing. You can use the library against hardened domain controllers. Thanks cannatag and CravateRouge.

Get the last version: github.com/cannatag/ldap3

More info: offsec.almond.consulting/ldap-

Almond OffSec boosted:
drmdrm
2024-01-16
2023-12-11

Stoked to see #PassTheCert featured in ippsec ‘s solution to HackTheBox Authority🧑‍⚖️!

Video: youtube.com/watch?v=7AF5riqLy-

Find the tool here: github.com/AlmondOffSec/PassTh

Screenshot of the ippsec's video showing PassTheCert github.
2023-11-15

We updated this old gem by @myst404 to include the new #GLPI decryption algorithm.

offsec.almond.consulting/multi

Snippet of the new decryption algorithm for stored secrets in GLPI > 9.5.
2023-10-31

Understanding the different types of LDAP authentication methods is fundamental to apprehend subjects such as relay attacks or countermeasures. This post by @drm introduces them through the lens of Python libraries.

offsec.almond.consulting/ldap-

Summary
Almond OffSec boosted:
drmdrm
2023-10-02

pywerview v0.5.2 is out! It implements, among other things, the "simple authentication trick" to use the tool against hardened DCs and without install custom ldap3 lib.

🌻

2023-09-22

To fix the bypass, @matrix hardened the CSP by restricting allowed domains to reCAPTCHA related ones.

github.com/matrix-org/matrix-r

Screenshot of the hardened CSP.
2023-09-22

PoC:
```
<iframe srcdoc="<body><script src=&quot;gstatic.com/fsn/angular_js-bun;></script><div ng-app> {{'a'.constructor.prototype.charAt=[].join;$eval('x=eval(atob(`YWxlcnQodG9wLmxvY2F0aW9uKSAK`))');}}</div></body>"></iframe>bbbb
```

2023-09-22

The final payload that worked for the web app and the electron-based one used a base64 encoded string within the eval method. An iframe tag is used because the application is a SPA.

XSS is triggered within Element webapp
2023-09-22

This version is vulnerable to sandbox escape with "{{'a'.constructor.prototype.charAt=[].join;$eval('x=alert(1)');}}" (originally found by Gareth Heyes). However, this payload is known to bug if the eval contains a "." (dot character).

If the payload contains a ".", an error is thrown in the js console.
2023-09-22

Original CSP included a "script-src gstatic.com 'unsafe-eval'" directive. gstatic CDN still hosts out of date libraries such as AngularJS 1.3.20.

Screenshot of the permissive CSP
2023-09-22

A few months ago, Cadence Ember found an HTML injection in the matrix-react-sdk, mostly used by the @element client. The CVE advisory stated that the implemented Content-Security-Policy mitigated the risk of XSS. So, team member S1m poc'ed a bypass. 🧵

The CVE advisory states that: "No cross-site scripting attack is possible due to the hardcoded content security policy."
2023-07-06

A look back at CVE-2020-0911, a Windows Installer EoP found by jonasLyk with team member @clavoillotte:
offsec.almond.consulting/windo

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst