Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
Network Penetration Testing:
The people who work in this branch have a good knowledge of infrastructure and network services and the skills and tools of penetration testing, or rather, the skills and tools of hacking to find the weaknesses and vulnerabilities of different equipment and systems. and different network services use, these people must use the latest tools and methods to be able to pass through network security mechanisms to find various network weaknesses.


You can learn these contents in our channel and have access to various resources.


@NetPentesters

Persian Channel : @NetPentester
👎1🥰1
#Red_Team

For penetration testing / Red Team / CTF / Cybersecurity / Certifications

https://github.com/CyberSecurity2045/Pentest

@BlueRedTeam
👍5
#Red_Team

​​Certipy

Certipy is an offensive tool for enumerating and abusing Active Directory Certificate Services (AD CS).

If you're not familiar with AD CS and the various domain escalation techniques, I highly recommend reading Certified Pre-Owned by Will Schroeder and Lee Christensen.

https://github.com/ly4k/Certipy

Certipy 4.0: ESC9 & ESC10, BloodHound GUI, New Authentication and Request Methods — and more!: https://research.ifcr.dk/7237d88061f7

@BlueRedTeam
#Red_Team
​​ADenum

ADEnum.py is a pentesting tool that allows to find misconfiguration through the protocol LDAP and exploit some of those weaknesses with Kerberos.

LDAP:

▫️ Enum Domain Admin users
▫️ Enum Domain Controllers
▫️ Enum Domain users with Password Not Expire
▫️ Enum Domain users with old password
▫️ Enum Domain users with interesting denoscription
▫️ Enum Domain users with not the default encryption
▫️ Enum Domain users with Protecting Privileged Domain Accounts

Kerberos:

▫️ AS-REP Roastable
▫️ Kerberoastable
▫️ Password cracking with john (krb5tgs and krb5asrep)

https://github.com/SecuProject/ADenum

@BlueRedTeam
👍2
#Red_Team
BloodHound

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment.

Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify.

Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment.

https://github.com/BloodHoundAD/BloodHound

Introducing BloodHound 4.2 — The Azure Refactor:
https://posts.specterops.io/1cff734938bd

Active Directory Enumeration: BloodHound:
https://www.hackingarticles.in/active-directory-enumeration-bloodhound/

@BlueRedTeam
👍3
#Cobalt_Strike
Cobalt Strike UDRL for memory scanner evasion.

Features

Easy to Use:
Import a single CNA noscript before generating shellcode.

Dynamic Memory Encryption:
Creates a new heap for any allocations from Beacon and encrypts entries before sleep.

Code Obfuscation and Encryption:
Changes the memory containing CS executable code to non-executable and encrypts it (FOLIAGE).

Return Address Spoofing at Execution:
Certain WinAPI calls are executed with a spoofed return address (InternetConnectA, NtWaitForSingleObject, RtlAllocateHeap).

Sleep Without Sleep:
Delayed execution using WaitForSingleObjectEx.

RC4 Encryption:
All encryption performed with SystemFunction032.

https://github.com/kyleavery/AceLdr

@BlueRedTeam