Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
🏃‍♂️ آموزش های رایگان امنیت شبکه و تست نفوذ
مقالات حوزه امنیت شبکه و تست نفوذ
🔴 پکیج های آموزشی
🔰 به همراه فیلم های آموزشی رایگان

https://news.1rj.ru/str/irsecurityworld
#Red_Team #Blue_Team
MITRE ATT&CK Matrix for Kubernetes: Tactics & Techniques 

Part 1
Part 2
Part 3

@BlueRedTeam
👍2
Network Penetration Testing:
The people who work in this branch have a good knowledge of infrastructure and network services and the skills and tools of penetration testing, or rather, the skills and tools of hacking to find the weaknesses and vulnerabilities of different equipment and systems. and different network services use, these people must use the latest tools and methods to be able to pass through network security mechanisms to find various network weaknesses.


You can learn these contents in our channel and have access to various resources.


@NetPentesters

Persian Channel : @NetPentester
👎1🥰1
#Red_Team

For penetration testing / Red Team / CTF / Cybersecurity / Certifications

https://github.com/CyberSecurity2045/Pentest

@BlueRedTeam
👍5
#Red_Team

​​Certipy

Certipy is an offensive tool for enumerating and abusing Active Directory Certificate Services (AD CS).

If you're not familiar with AD CS and the various domain escalation techniques, I highly recommend reading Certified Pre-Owned by Will Schroeder and Lee Christensen.

https://github.com/ly4k/Certipy

Certipy 4.0: ESC9 & ESC10, BloodHound GUI, New Authentication and Request Methods — and more!: https://research.ifcr.dk/7237d88061f7

@BlueRedTeam
#Red_Team
​​ADenum

ADEnum.py is a pentesting tool that allows to find misconfiguration through the protocol LDAP and exploit some of those weaknesses with Kerberos.

LDAP:

▫️ Enum Domain Admin users
▫️ Enum Domain Controllers
▫️ Enum Domain users with Password Not Expire
▫️ Enum Domain users with old password
▫️ Enum Domain users with interesting denoscription
▫️ Enum Domain users with not the default encryption
▫️ Enum Domain users with Protecting Privileged Domain Accounts

Kerberos:

▫️ AS-REP Roastable
▫️ Kerberoastable
▫️ Password cracking with john (krb5tgs and krb5asrep)

https://github.com/SecuProject/ADenum

@BlueRedTeam
👍2
#Red_Team
BloodHound

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment.

Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify.

Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment.

https://github.com/BloodHoundAD/BloodHound

Introducing BloodHound 4.2 — The Azure Refactor:
https://posts.specterops.io/1cff734938bd

Active Directory Enumeration: BloodHound:
https://www.hackingarticles.in/active-directory-enumeration-bloodhound/

@BlueRedTeam
👍3