Skip to content

Commit

Permalink
Update documentation
Browse files Browse the repository at this point in the history
  • Loading branch information
Cyb3rPandaH committed Jan 12, 2022
1 parent 81bcd6b commit b5099f2
Show file tree
Hide file tree
Showing 69 changed files with 1,678 additions and 416 deletions.
2 changes: 2 additions & 0 deletions adfs_initial_web_kerberos_network.html
Original file line number Diff line number Diff line change
Expand Up @@ -662,6 +662,8 @@ <h3 class="read-next-card-header-title"><a href="/tag/adfs/">Adfs</a></h3>








Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
21 changes: 18 additions & 3 deletions atom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -8,13 +8,28 @@


<item>
<title>CVE-2021-44228 Log4jShell: Setting Up Virtual Machines for the Attacker and Victim</title>
<title>CVE-2021-44228: Exploiting Log4j Vulnerabilities using Rogue JNDI</title>

<description>&lt;p&gt;In this blog post, we will share the steps that you can follow to set up the attacker and victim’s virtual machines in VirtualBox (Version 6.1.30) that you can use to simulate an attack that exploits &lt;strong&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228&quot;&gt;CVE-2021-44228&lt;/a&gt;&lt;/strong&gt;. We will follow the steps provided within the &lt;a href=&quot;https://github.com/Cyb3rWard0g/log4jshell-lab&quot;&gt;log4jshell-lab&lt;/a&gt; GitHub repository by &lt;a href=&quot;https://twitter.com/Cyb3rWard0g&quot;&gt;Roberto Rodriguez&lt;/a&gt;&lt;/p&gt;
<description>&lt;p&gt;In this blog post, we will share the steps that you can follow to simulate the use of &lt;strong&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228&quot;&gt;CVE-2021-44228&lt;/a&gt;&lt;/strong&gt; to exploit &lt;strong&gt;Log4j&lt;/strong&gt; vulnerabilities using &lt;strong&gt;Rogue JNDI&lt;/strong&gt; (Malicious LDAP Server). We will follow the steps provided within the &lt;a href=&quot;https://github.com/Cyb3rWard0g/log4jshell-lab&quot;&gt;log4jshell-lab&lt;/a&gt; GitHub repository by &lt;a href=&quot;https://twitter.com/Cyb3rWard0g&quot;&gt;Roberto Rodriguez&lt;/a&gt;&lt;/p&gt;

</description>

<pubDate>Tue, 11 Jan 2022 07:00:00 -0500</pubDate>
<pubDate>Tue, 11 Jan 2022 20:00:00 -0500</pubDate>
<link>
https://blog.openthreatresearch.com/simulating_cve_2021_44228</link>
<guid isPermaLink="true">https://blog.openthreatresearch.com/simulating_cve_2021_44228</guid>
</item>



<item>
<title>CVE-2021-44228: Setting Up Virtual Machines for the Attacker and Victim</title>

<description>&lt;p&gt;In this blog post, we will share the steps that you can follow to set up the attacker and victim’s virtual machines in VirtualBox (Version 6.1.30) that you can use to simulate the use of &lt;strong&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228&quot;&gt;CVE-2021-44228&lt;/a&gt;&lt;/strong&gt; to exploit &lt;strong&gt;Log4j&lt;/strong&gt; vulnerabilities. We will follow the steps provided within the &lt;a href=&quot;https://github.com/Cyb3rWard0g/log4jshell-lab&quot;&gt;log4jshell-lab&lt;/a&gt; GitHub repository by &lt;a href=&quot;https://twitter.com/Cyb3rWard0g&quot;&gt;Roberto Rodriguez&lt;/a&gt;&lt;/p&gt;

</description>

<pubDate>Tue, 11 Jan 2022 06:00:00 -0500</pubDate>
<link>
https://blog.openthreatresearch.com/setting_up_attacker_victim_machines</link>
<guid isPermaLink="true">https://blog.openthreatresearch.com/setting_up_attacker_victim_machines</guid>
Expand Down
479 changes: 247 additions & 232 deletions author/jose/feed.xml

Large diffs are not rendered by default.

120 changes: 87 additions & 33 deletions author/jose/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@ <h2 class="author-bio">Security Researcher</h2>
<div class="author-location">USA-Peru <span class="bull">&bull;</span></div>

<div class="author-stats">
17 posts <span class="bull">&bull;</span>
18 posts <span class="bull">&bull;</span>
</div>

<a class="social-link social-link-wb" href="https://github.com/Cyb3rPandaH/" target="_blank" rel="noopener"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path d="M23.5 11.957c0 6.375-5.163 11.544-11.532 11.544C5.599 23.5.5 18.125.5 11.75.5 5.542 5.37.758 11.505.511l.5-.011C18.374.5 23.5 5.582 23.5 11.957zM11.505.511c-6 6.5-6 14.98 0 22.98m1-22.98c6 6.5 6 14.977 0 22.977M2 17.479h20.063m-19.657-12h19.062m-20.968 6h22.938" stroke="#000" stroke-linejoin="round" stroke-miterlimit="10" fill="none"/></svg>
Expand Down Expand Up @@ -191,6 +191,60 @@ <h2 class="author-bio">Security Researcher</h2>



<article class="post-card author-template">

<a class="post-card-image-link" href="/simulating_cve_2021_44228">
<div class="post-card-image" style="background-image: url(/assets/images/blog/log4jshell_simulation/attacker_control_of_tomcat.png)"></div>
</a>

<div class="post-card-content">
<a class="post-card-content-link" href="/simulating_cve_2021_44228">
<header class="post-card-header">



<span class="post-card-tags">Log4jshell</span>




<h2 class="post-card-title">CVE-2021-44228: Exploiting Log4j Vulnerabilities using Rogue JNDI</h2>
</header>
<section class="post-card-excerpt">

<p>In this blog post, we will share the steps that you can follow to simulate the use of CVE-2021-44228 to exploit Log4j vulnerabilities using Rogue JNDI (Malicious LDAP Server). We will follow the</p>

</section>
</a>
<footer class="post-card-meta">





<img class="author-profile-image" src="/assets/images/authors/avatar-jose.jpg" alt="Jose Rodriguez" />

<span class="post-card-author">
<a href="/author/jose/">Jose Rodriguez</a>
</span>








<span class="reading-time">


2 min read

</span>
</footer>
</div>
</article>

<article class="post-card author-template">

<a class="post-card-image-link" href="/setting_up_attacker_victim_machines">
Expand All @@ -212,11 +266,11 @@ <h2 class="author-bio">Security Researcher</h2>



<h2 class="post-card-title">CVE-2021-44228 Log4jShell: Setting Up Virtual Machines for the Attacker and Victim</h2>
<h2 class="post-card-title">CVE-2021-44228: Setting Up Virtual Machines for the Attacker and Victim</h2>
</header>
<section class="post-card-excerpt">

<p>In this blog post, we will share the steps that you can follow to set up the attacker and victim’s virtual machines in VirtualBox (Version 6.1.30) that you can use to simulate an</p>
<p>In this blog post, we will share the steps that you can follow to set up the attacker and victim’s virtual machines in VirtualBox (Version 6.1.30) that you can use to simulate the</p>

</section>
</a>
Expand Down Expand Up @@ -601,16 +655,20 @@ <h2 class="post-card-title">PySpark.SQL and Jupyter Notebooks on Visual Studio C

<article class="post-card author-template">

<a class="post-card-image-link" href="/first_jupyter_notebook_vscode">
<div class="post-card-image" style="background-image: url(/assets/images/blog/2021-01-01_00_notebook_cover.jpg)"></div>
<a class="post-card-image-link" href="/importing-mordor-dataset-jupyter-notebook-vscode">
<div class="post-card-image" style="background-image: url(/assets/images/blog/2021-01-01_00_mordor_json_file_imported_cover.jpg)"></div>
</a>

<div class="post-card-content">
<a class="post-card-content-link" href="/first_jupyter_notebook_vscode">
<a class="post-card-content-link" href="/importing-mordor-dataset-jupyter-notebook-vscode">
<header class="post-card-header">



<span class="post-card-tags">Mordor</span>



<span class="post-card-tags">Jupyter-notebook</span>


Expand All @@ -624,11 +682,11 @@ <h2 class="post-card-title">PySpark.SQL and Jupyter Notebooks on Visual Studio C



<h2 class="post-card-title">My First Jupyter Notebook on Visual Studio Code (Python kernel)</h2>
<h2 class="post-card-title">Importing a Mordor Dataset with Jupyter Notebooks on Visual Studio Code (Python kernel)</h2>
</header>
<section class="post-card-excerpt">

<p>In this blogpost, I will share the steps that you can follow in order to generate and use a Jupyter Notebook on Visual Studio Code (VSCode). During the development of this blogpost I</p>
<p>In this blogpost, I will share the steps that you can follow in order to import a Mordor dataset to your workspace on Visual Studio Code (VSCode) using a Jupyter Notebook. During the</p>

</section>
</a>
Expand All @@ -654,7 +712,7 @@ <h2 class="post-card-title">My First Jupyter Notebook on Visual Studio Code (Pyt
<span class="reading-time">


4 min read
2 min read

</span>
</footer>
Expand All @@ -663,20 +721,16 @@ <h2 class="post-card-title">My First Jupyter Notebook on Visual Studio Code (Pyt

<article class="post-card author-template">

<a class="post-card-image-link" href="/importing-mordor-dataset-jupyter-notebook-vscode">
<div class="post-card-image" style="background-image: url(/assets/images/blog/2021-01-01_00_mordor_json_file_imported_cover.jpg)"></div>
<a class="post-card-image-link" href="/first_jupyter_notebook_vscode">
<div class="post-card-image" style="background-image: url(/assets/images/blog/2021-01-01_00_notebook_cover.jpg)"></div>
</a>

<div class="post-card-content">
<a class="post-card-content-link" href="/importing-mordor-dataset-jupyter-notebook-vscode">
<a class="post-card-content-link" href="/first_jupyter_notebook_vscode">
<header class="post-card-header">



<span class="post-card-tags">Mordor</span>



<span class="post-card-tags">Jupyter-notebook</span>


Expand All @@ -690,11 +744,11 @@ <h2 class="post-card-title">My First Jupyter Notebook on Visual Studio Code (Pyt



<h2 class="post-card-title">Importing a Mordor Dataset with Jupyter Notebooks on Visual Studio Code (Python kernel)</h2>
<h2 class="post-card-title">My First Jupyter Notebook on Visual Studio Code (Python kernel)</h2>
</header>
<section class="post-card-excerpt">

<p>In this blogpost, I will share the steps that you can follow in order to import a Mordor dataset to your workspace on Visual Studio Code (VSCode) using a Jupyter Notebook. During the</p>
<p>In this blogpost, I will share the steps that you can follow in order to generate and use a Jupyter Notebook on Visual Studio Code (VSCode). During the development of this blogpost I</p>

</section>
</a>
Expand All @@ -720,7 +774,7 @@ <h2 class="post-card-title">Importing a Mordor Dataset with Jupyter Notebooks on
<span class="reading-time">


2 min read
4 min read

</span>
</footer>
Expand Down Expand Up @@ -1071,28 +1125,26 @@ <h2 class="post-card-title">Installing Git - Windows</h2>

<article class="post-card author-template">

<a class="post-card-image-link" href="/installing_java">
<div class="post-card-image" style="background-image: url(/assets/images/blog/2020-12-01_00_java_cover.jpg)"></div>
<a class="post-card-image-link" href="/installing_jekyll">
<div class="post-card-image" style="background-image: url(/assets/images/blog/2020-12-01_00_jekyll_installation_cover.jpg)"></div>
</a>

<div class="post-card-content">
<a class="post-card-content-link" href="/installing_java">
<a class="post-card-content-link" href="/installing_jekyll">
<header class="post-card-header">



<span class="post-card-tags">Java</span>
<span class="post-card-tags">Jekyll</span>




<h2 class="post-card-title">Installing Java - Windows</h2>
<h2 class="post-card-title">Installing Jekyll - Windows</h2>
</header>
<section class="post-card-excerpt">

<p>In this blogpost, I will share the steps that you can follow in order to install Java (1.8.0_281) on a Windows computer using Firefox as web browser.

</p>
<p>In this quick blogpost, I will share the steps that you can follow in order to install jekyll (4.2.0) on a Windows computer using Firefox as web browser and the command prompt. After</p>

</section>
</a>
Expand Down Expand Up @@ -1127,26 +1179,28 @@ <h2 class="post-card-title">Installing Java - Windows</h2>

<article class="post-card author-template">

<a class="post-card-image-link" href="/installing_jekyll">
<div class="post-card-image" style="background-image: url(/assets/images/blog/2020-12-01_00_jekyll_installation_cover.jpg)"></div>
<a class="post-card-image-link" href="/installing_java">
<div class="post-card-image" style="background-image: url(/assets/images/blog/2020-12-01_00_java_cover.jpg)"></div>
</a>

<div class="post-card-content">
<a class="post-card-content-link" href="/installing_jekyll">
<a class="post-card-content-link" href="/installing_java">
<header class="post-card-header">



<span class="post-card-tags">Jekyll</span>
<span class="post-card-tags">Java</span>




<h2 class="post-card-title">Installing Jekyll - Windows</h2>
<h2 class="post-card-title">Installing Java - Windows</h2>
</header>
<section class="post-card-excerpt">

<p>In this quick blogpost, I will share the steps that you can follow in order to install jekyll (4.2.0) on a Windows computer using Firefox as web browser and the command prompt. After</p>
<p>In this blogpost, I will share the steps that you can follow in order to install Java (1.8.0_281) on a Windows computer using Firefox as web browser.

</p>

</section>
</a>
Expand Down
2 changes: 1 addition & 1 deletion author/joshua/feed.xml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<generator uri="https://jekyllrb.com/" version="3.9.1">Jekyll</generator>
<link href="https://blog.openthreatresearch.com/author/joshua/feed.xml" rel="self" type="application/atom+xml" />
<link href="https://blog.openthreatresearch.com/" rel="alternate" type="text/html" />
<updated>2022-01-11T18:08:31-05:00</updated>
<updated>2022-01-12T01:20:57-05:00</updated>
<id>https://blog.openthreatresearch.com/author/joshua/feed.xml</id>


Expand Down
2 changes: 1 addition & 1 deletion author/mauricio/feed.xml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<generator uri="https://jekyllrb.com/" version="3.9.1">Jekyll</generator>
<link href="https://blog.openthreatresearch.com/author/mauricio/feed.xml" rel="self" type="application/atom+xml" />
<link href="https://blog.openthreatresearch.com/" rel="alternate" type="text/html" />
<updated>2022-01-11T18:08:31-05:00</updated>
<updated>2022-01-12T01:20:57-05:00</updated>
<id>https://blog.openthreatresearch.com/author/mauricio/feed.xml</id>


Expand Down
2 changes: 1 addition & 1 deletion author/roberto/feed.xml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<generator uri="https://jekyllrb.com/" version="3.9.1">Jekyll</generator>
<link href="https://blog.openthreatresearch.com/author/roberto/feed.xml" rel="self" type="application/atom+xml" />
<link href="https://blog.openthreatresearch.com/" rel="alternate" type="text/html" />
<updated>2022-01-11T18:08:31-05:00</updated>
<updated>2022-01-12T01:20:57-05:00</updated>
<id>https://blog.openthreatresearch.com/author/roberto/feed.xml</id>


Expand Down
2 changes: 1 addition & 1 deletion author/valentina/feed.xml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<generator uri="https://jekyllrb.com/" version="3.9.1">Jekyll</generator>
<link href="https://blog.openthreatresearch.com/author/valentina/feed.xml" rel="self" type="application/atom+xml" />
<link href="https://blog.openthreatresearch.com/" rel="alternate" type="text/html" />
<updated>2022-01-11T18:08:31-05:00</updated>
<updated>2022-01-12T01:20:57-05:00</updated>
<id>https://blog.openthreatresearch.com/author/valentina/feed.xml</id>


Expand Down
2 changes: 2 additions & 0 deletions azure_ad_connect_sync_adfs_setup.html
Original file line number Diff line number Diff line change
Expand Up @@ -408,6 +408,8 @@ <h3 class="read-next-card-header-title"><a href="/tag/azure/">Azure</a></h3>








Expand Down
2 changes: 2 additions & 0 deletions azure_storage_account_via_arm_private_files.html
Original file line number Diff line number Diff line change
Expand Up @@ -362,6 +362,8 @@ <h3 class="read-next-card-header-title"><a href="/tag/azure/">Azure</a></h3>








Expand Down
2 changes: 2 additions & 0 deletions csr-ssl-certificate-activation.html
Original file line number Diff line number Diff line change
Expand Up @@ -460,6 +460,8 @@ <h3 class="read-next-card-header-title"><a href="/tag/dns/">Dns</a></h3>








Expand Down
Loading

0 comments on commit b5099f2

Please sign in to comment.