#Blue_Team
+ Detect and block Credential Dumps with Defender for Endpoint & Attack Surface Reduction
https://jeffreyappel.nl/detect-and-block-credential-dumps-with-defender-for-endpoint-attack-surface-reduction
+ Fuzzuli - url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain
https://github.com/musana/fuzzuli
@BlueRedTeam
+ Detect and block Credential Dumps with Defender for Endpoint & Attack Surface Reduction
https://jeffreyappel.nl/detect-and-block-credential-dumps-with-defender-for-endpoint-attack-surface-reduction
+ Fuzzuli - url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain
https://github.com/musana/fuzzuli
@BlueRedTeam
Jeffrey Appel - Microsoft Security blog
Detect and block Credential Dumps with Defender for Endpoint & Attack Surface Reduction
Credential dumping or password dump is a technique used by cybercriminals to gain access to a network. They will enter the workstation through phishing and controls through the typical way the admin uses and monitors the network to find more...
#Red_Team
The Phantom Credentials of SCCM: Why the NAA Won’t Die
https://posts.specterops.io/the-phantom-credentials-of-sccm-why-the-naa-wont-die-332ac7aa1ab9
@BlueRedTeam
The Phantom Credentials of SCCM: Why the NAA Won’t Die
https://posts.specterops.io/the-phantom-credentials-of-sccm-why-the-naa-wont-die-332ac7aa1ab9
@BlueRedTeam
SpecterOps
The Phantom Credentials of SCCM: Why the NAA Won’t Die - SpecterOps
Explore the risks lurking within SCCM's Network Access Accounts, why transitioning to Enhanced HTTP isn't enough, and why disabling NAAs from AD is crucial.
#Red_Team
multi-purpose Red Team Assessment access and exploitation framework for exploitation C2, backdooring and defense mechanism evasion purposes on restricted enviroments
https://github.com/blueudp/backvenom
@BlueRedTeam
multi-purpose Red Team Assessment access and exploitation framework for exploitation C2, backdooring and defense mechanism evasion purposes on restricted enviroments
https://github.com/blueudp/backvenom
@BlueRedTeam
GitHub
GitHub - blueudp/backvenom: multi-purpose Red Team Assessment access and exploitation framework for exploitation C2, backdooring…
multi-purpose Red Team Assessment access and exploitation framework for exploitation C2, backdooring and defense mechanism evasion purposes on restricted enviroments - GitHub - blueudp/backvenom: m...
Forwarded from PFK Git [ international ]
This media is not supported in your browser
VIEW IN TELEGRAM
Hacking a Company with 0-Click Email Attack | #phishing #redteam
As a penetration tester or red teamer, one of the methods of breaking into a company is #phishing and using this 0-click phishing attack it is possible to grab a user's NetNTLMv2 hash which you can relay or crack to escalate privileges or move laterally through the network. This attack could be useful on a #redteam engagement.
YouTube
@DK_HBB2
As a penetration tester or red teamer, one of the methods of breaking into a company is #phishing and using this 0-click phishing attack it is possible to grab a user's NetNTLMv2 hash which you can relay or crack to escalate privileges or move laterally through the network. This attack could be useful on a #redteam engagement.
YouTube
@DK_HBB2
❤2👍2
#Red_Team
A collection of Script for Red Team & Incidence Response
https://github.com/Johnng007/Black-Widow
@BlueRedTeam
A collection of Script for Red Team & Incidence Response
https://github.com/Johnng007/Black-Widow
@BlueRedTeam
GitHub
GitHub - Johnng007/Black-Widow: A collection of Script for Red Team & Incidence Response
A collection of Script for Red Team & Incidence Response - Johnng007/Black-Widow
👍3
#Red_Team
+ Weaponizing and Abusing Hidden Functionalities Contained in Office Document Properties
https://www.offensive-security.com/offsec/macro-weaponization
+ Modular command-line tool to parse, create and manipulate JWT tokens
https://github.com/KINGSABRI/jwtear
@BlueRedTeam
+ Weaponizing and Abusing Hidden Functionalities Contained in Office Document Properties
https://www.offensive-security.com/offsec/macro-weaponization
+ Modular command-line tool to parse, create and manipulate JWT tokens
https://github.com/KINGSABRI/jwtear
@BlueRedTeam
OffSec
Weaponizing and Abusing Hidden Functionalities Contained in Office Document Properties | OffSec
TJ shows us how adversaries use macro weaponization techniques to abuse hidden functionalities contained in Office document properties.
#exploit
+ CVE-2022-28219:
Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus
https://www.horizon3.ai/red-team-blog-cve-2022-28219
+ CVE-2022-28117:
Navigate CMS <= 2.9.4 - Server-Side Request Forgery (Authenticated)
https://github.com/cheshireca7/CVE-2022-28117
+ PDF Exploit
https://github.com/CodiumAlgorithm/Silent-PDF-Exploit-Builder-2022---PDF-Exploits
@BlueRedTeam
+ CVE-2022-28219:
Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus
https://www.horizon3.ai/red-team-blog-cve-2022-28219
+ CVE-2022-28117:
Navigate CMS <= 2.9.4 - Server-Side Request Forgery (Authenticated)
https://github.com/cheshireca7/CVE-2022-28117
+ PDF Exploit
https://github.com/CodiumAlgorithm/Silent-PDF-Exploit-Builder-2022---PDF-Exploits
@BlueRedTeam
Horizon3.ai
CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus
CVE-2022-28219 is an unauthenticated remote code execution vulnerability affecting Zoho ManageEngine ADAudit Plus, a compliance tool used by enterprises to monitor changes to Active Directory.
😱1
#CVE-2022
PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication
https://github.com/yuriisanin/CVE-2022-24342
@BlueRedTeam
PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication
https://github.com/yuriisanin/CVE-2022-24342
@BlueRedTeam
GitHub
GitHub - yuriisanin/CVE-2022-24342: PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication
PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication - yuriisanin/CVE-2022-24342
❤4👍1
#Red_Team
Red Teaming Active Directory
When delivering an advanced penetration test or red team exercise, we want our activities to look like normal actions. Not only we will be stealthy this way, but we will minimize the posssibilities of disrupting normal operations as well.
https://h4ms1k.github.io/Red_Team_Active_Directory/
@BlueRedTeam
Red Teaming Active Directory
When delivering an advanced penetration test or red team exercise, we want our activities to look like normal actions. Not only we will be stealthy this way, but we will minimize the posssibilities of disrupting normal operations as well.
https://h4ms1k.github.io/Red_Team_Active_Directory/
@BlueRedTeam
The power of the mind
Red Teaming Active Directory
Introduction
#CVE-2022
A Simple bash noscript that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11
https://github.com/ih3na/debian11-dirty_pipe-patcher
@BlueRedTeam
A Simple bash noscript that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11
https://github.com/ih3na/debian11-dirty_pipe-patcher
@BlueRedTeam
GitHub
GitHub - ih3na/debian11-dirty_pipe-patcher: A Simple bash noscript that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability…
A Simple bash noscript that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11 - ih3na/debian11-dirty_pipe-patcher
#CVE-2022
metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445
https://github.com/Ziggy78/CVE-2022-26809-RCE
@BlueRedTeam
metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445
https://github.com/Ziggy78/CVE-2022-26809-RCE
@BlueRedTeam
#Red_Team
Web Hacking and Red Teaming MindMap
https://github.com/N1arut/Pentesting-Mind-Map
@BlueRedTeam
Web Hacking and Red Teaming MindMap
https://github.com/N1arut/Pentesting-Mind-Map
@BlueRedTeam
GitHub
GitHub - N1arut/Pentesting-Mind-Map: Web Hacking and Red Teaming MindMap
Web Hacking and Red Teaming MindMap. Contribute to N1arut/Pentesting-Mind-Map development by creating an account on GitHub.
👍3
#Red_Team
+ Trick the seclogon service to open a handle to LSASS and duplicate it before it is closed
https://github.com/helpsystems/nanodump/commit/c890da208511bacb09f91c68b935915821f4f0f0
+ Web Cache Deception Attacks
https://securitycafe.ro/2022/07/01/web-cache-deception-attacks
@BlueRedTeam
+ Trick the seclogon service to open a handle to LSASS and duplicate it before it is closed
https://github.com/helpsystems/nanodump/commit/c890da208511bacb09f91c68b935915821f4f0f0
+ Web Cache Deception Attacks
https://securitycafe.ro/2022/07/01/web-cache-deception-attacks
@BlueRedTeam
GitHub
add new option: --malseclogon-race · fortra/nanodump@c890da2
Trick the seclogon service to open a handle to LSASS and duplicate it
before it is closed. Many thanks to @splinter_code
before it is closed. Many thanks to @splinter_code
#CVE-2022
An eBPF detection program for CVE-2022-0847
https://github.com/airbus-cert/dirtypipe-ebpf_detection
@BlueRedTeam
An eBPF detection program for CVE-2022-0847
https://github.com/airbus-cert/dirtypipe-ebpf_detection
@BlueRedTeam
GitHub
GitHub - airbus-cert/dirtypipe-ebpf_detection: An eBPF detection program for CVE-2022-0847
An eBPF detection program for CVE-2022-0847. Contribute to airbus-cert/dirtypipe-ebpf_detection development by creating an account on GitHub.
#Cobalt_Strike
Public variation of Titan Loader. Tweaks Cobalt Strike's behavior with Import Address Table Hooks
https://github.com/SecIdiot/TitanLdr
@BlueRedTeam
Public variation of Titan Loader. Tweaks Cobalt Strike's behavior with Import Address Table Hooks
https://github.com/SecIdiot/TitanLdr
@BlueRedTeam
#Red_Team
Red-Teaming-TTPs
Free Resources to Practice
https://github.com/RoseSecurity/Red-Teaming-TTPs
@BlueRedTeam
Red-Teaming-TTPs
Free Resources to Practice
https://github.com/RoseSecurity/Red-Teaming-TTPs
@BlueRedTeam
GitHub
GitHub - RoseSecurity/Red-Teaming-TTPs: Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike! - RoseSecurity/Red-Teaming-TTPs
🔥4
#Red_Team
Red Teaming & Active Directory Cheat Sheet
https://github.com/expl0itabl3/Redsheet
@BlueRedTeam
Red Teaming & Active Directory Cheat Sheet
https://github.com/expl0itabl3/Redsheet
@BlueRedTeam
GitHub
GitHub - expl0itabl3/Redsheet: Red Teaming & Active Directory Cheat Sheet.
Red Teaming & Active Directory Cheat Sheet. Contribute to expl0itabl3/Redsheet development by creating an account on GitHub.
🔥1