Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
#Red_Team
BloodHound

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment.

Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify.

Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment.

https://github.com/BloodHoundAD/BloodHound

Introducing BloodHound 4.2 — The Azure Refactor:
https://posts.specterops.io/1cff734938bd

Active Directory Enumeration: BloodHound:
https://www.hackingarticles.in/active-directory-enumeration-bloodhound/

@BlueRedTeam
👍3
#Cobalt_Strike
Cobalt Strike UDRL for memory scanner evasion.

Features

Easy to Use:
Import a single CNA noscript before generating shellcode.

Dynamic Memory Encryption:
Creates a new heap for any allocations from Beacon and encrypts entries before sleep.

Code Obfuscation and Encryption:
Changes the memory containing CS executable code to non-executable and encrypts it (FOLIAGE).

Return Address Spoofing at Execution:
Certain WinAPI calls are executed with a spoofed return address (InternetConnectA, NtWaitForSingleObject, RtlAllocateHeap).

Sleep Without Sleep:
Delayed execution using WaitForSingleObjectEx.

RC4 Encryption:
All encryption performed with SystemFunction032.

https://github.com/kyleavery/AceLdr

@BlueRedTeam
Media is too big
VIEW IN TELEGRAM
#Red_Team
👺 Red team: Pentest two organizations at the same time.

• I would like to remind you about the useful webinar "Red team: Pentest with two contractors at the same time". Where real examples of attacks are analyzed:

Methods and tactics of physical penetration into the territory of the organization.
Penetration into the company's perimeter from the outside, through IoT in the apartment of the organization's management.
Gaining administrator access, including information security specialists through Active Directory, a client for MacOS (0-day)
Hacking ACS and camera systems in a cafe.
Installation of an eternal backdoor that could not be found even after reinstallation.
and much more...

@BlueRedTeam