π [ SEKTOR7net, SEKTOR7 Institute ]
Sliver comms from a threat hunter's perspective, by Kevin Breen of @immersivelabs
#redteam
https://t.co/apzLfFtYjX
π https://www.immersivelabs.com/blog/detecting-and-decrypting-sliver-c2-a-threat-hunters-guide/
π₯ [ tweet ]
Sliver comms from a threat hunter's perspective, by Kevin Breen of @immersivelabs
#redteam
https://t.co/apzLfFtYjX
π https://www.immersivelabs.com/blog/detecting-and-decrypting-sliver-c2-a-threat-hunters-guide/
π₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
π [ t3l3machus, Panagiotis Chartas ]
A browser Man-In-The-Middle attack in 58 seconds, using #toxssin.
β GitHub -> https://t.co/1IVyfjakJ5
π₯ Full video -> https://t.co/v1Oapbw8uU
Please subscribe -> https://t.co/Gcekp1Gagb
#hacking #hackingtools #xss #pentesting #redteam #t3l3machus https://t.co/zJ2Fv99iOR
π https://github.com/t3l3machus/toxssin
π https://youtu.be/Z9I4UJUBrrY
π https://www.youtube.com/@HaxorTechTones
π₯ [ tweet ]
A browser Man-In-The-Middle attack in 58 seconds, using #toxssin.
β GitHub -> https://t.co/1IVyfjakJ5
π₯ Full video -> https://t.co/v1Oapbw8uU
Please subscribe -> https://t.co/Gcekp1Gagb
#hacking #hackingtools #xss #pentesting #redteam #t3l3machus https://t.co/zJ2Fv99iOR
π https://github.com/t3l3machus/toxssin
π https://youtu.be/Z9I4UJUBrrY
π https://www.youtube.com/@HaxorTechTones
π₯ [ tweet ]
π₯7
π [ ZephrFish, Andy ]
Great post from @_RayRT on abusing different Active Directory object controls and how to detect them https://t.co/CFQvEuA0Rv #RedTeam #blueteam #purpleteam #cti
π http://labs.lares.com/securing-active-directory-via-acls/
π₯ [ tweet ]
Great post from @_RayRT on abusing different Active Directory object controls and how to detect them https://t.co/CFQvEuA0Rv #RedTeam #blueteam #purpleteam #cti
π http://labs.lares.com/securing-active-directory-via-acls/
π₯ [ tweet ]
π6
π [ kleiton0x7e, Kleiton Kurti ]
Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.
Github:
#CyberSecurity #redteam #infosec #infosecurity
π https://github.com/WKL-Sec/wmiexec/
π₯ [ tweet ]
Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.
Github:
#CyberSecurity #redteam #infosec #infosecurity
π https://github.com/WKL-Sec/wmiexec/
π₯ [ tweet ]
π₯3
π [ Octoberfest73, Octoberfest7 ]
Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.
This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.
#redteam #Malware
π https://github.com/Octoberfest7/TeamsPhisher
π₯ [ tweet ]
Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.
This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.
#redteam #Malware
π https://github.com/Octoberfest7/TeamsPhisher
π₯ [ tweet ]
π₯3π1
π [ SEKTOR7net, SEKTOR7 Institute ]
A guide to building your engagement infrastructure, by AndrΓ© Tschapeller (@hipstertrojan)
#redteam
π https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/
π₯ [ tweet ]
A guide to building your engagement infrastructure, by AndrΓ© Tschapeller (@hipstertrojan)
#redteam
π https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/
π₯ [ tweet ]
π₯1
π [ r1cksec, r1cksec ]
New cheatsheets pushed π΅οΈββοΈ
π https://github.com/r1cksec/cheatsheets
Including:
A well written blog post on how to read and parse LSASS memory dumps with PowerShell π
#infosec #cybersecurity #pentesting #redteam #lsass #windows
π https://powerseb.github.io/posts/LSASS-parsing-without-a-cat
π₯ [ tweet ]
New cheatsheets pushed π΅οΈββοΈ
π https://github.com/r1cksec/cheatsheets
Including:
A well written blog post on how to read and parse LSASS memory dumps with PowerShell π
#infosec #cybersecurity #pentesting #redteam #lsass #windows
π https://powerseb.github.io/posts/LSASS-parsing-without-a-cat
π₯ [ tweet ]
π4
Media is too big
VIEW IN TELEGRAM
π [ fortunato lodari @flodari ]
Are you tired of failing to create DNS Entry for DavRelay?
LPE with:
no AV/EDR detection, only SIEM (if) checks on LDAP changes
#redteam #LPE #DAVRelay #FUD
π₯ [ tweet ]
+ Π΄Π΅ΠΌΠΎ Π½Π° ΠΊΠΎΠ±Π΅:
π https://threadreaderapp.com/thread/1697922181684936753.html
Are you tired of failing to create DNS Entry for DavRelay?
LPE with:
ssh -R +
addcomputer.py +
Proxychains +
Proxylite +
PetitPotam +
rbcd_relayno AV/EDR detection, only SIEM (if) checks on LDAP changes
#redteam #LPE #DAVRelay #FUD
π₯ [ tweet ]
+ Π΄Π΅ΠΌΠΎ Π½Π° ΠΊΠΎΠ±Π΅:
π https://threadreaderapp.com/thread/1697922181684936753.html
π₯10
π [ Louis Dion-Marcil @ldionmarcil ]
Outlook for Windows can be tricked into displaying a fake domain, but open another one. Add a <base> tag with a fake domain + left-to-right mark (U+200E)
Links in <a> tags will show the fake domain, but open the real domain.
No need to buy .zip! :) Convincing #phishing #redteam
π₯ [ tweet ]
Outlook for Windows can be tricked into displaying a fake domain, but open another one. Add a <base> tag with a fake domain + left-to-right mark (U+200E)
Links in <a> tags will show the fake domain, but open the real domain.
No need to buy .zip! :) Convincing #phishing #redteam
π₯ [ tweet ]
π₯5π1π₯±1
π [ HADESS @Hadess_security ]
The Art Of Hiding In Windows: techniques used by malicious actors to obscure their activities, making detection and analysis significantly more challenging for security professionals.
Article:
π https://hadess.io/the-art-of-hiding-in-windows/
EBook:
π https://hadess.io/the-art-of-hiding-in-windows-ebook/
#windows #redteam
π₯ [ tweet ]
The Art Of Hiding In Windows: techniques used by malicious actors to obscure their activities, making detection and analysis significantly more challenging for security professionals.
Article:
π https://hadess.io/the-art-of-hiding-in-windows/
EBook:
π https://hadess.io/the-art-of-hiding-in-windows-ebook/
#windows #redteam
π₯ [ tweet ]
(pdf-ΠΊΠ° Π² ΠΊΠΎΠΌΠΌΠ΅Π½ΡΠ°Ρ
)π2π₯2