Network Penetration Testing – Telegram
Network Penetration Testing
559 subscribers
44 photos
3 videos
11 files
261 links
[ Network Penetration Testing & Cloud ]

Any misuse of this info will not be the responsibility of the author, educational purposes only.

Channel - En :
@NetPentesters
Download Telegram
نحوه استفاده از Kubesploit و KubiScan برای بهبود امنیت Cloud Native

https://www.conjur.org/blog/tutorial-kubernetes-vulnerability-scanning-testing-with-open-source

#Cloud
#Security
@NetPentester
MITRE ATT&CK TTP’s used by LAPSUS$

Two interesting techniques used by LAPSUS$ (Code Signing, Disable, and Modify Tools)

#MITRE
@NetPentester
Vulnerable Active Directory
Create a vulnerable AD that will allow you to test most AD attacks in a local lab

Main characteristics:
- Random attacks
- Full coverage of the listed attacks
- it is necessary to run the noscript in DC with Active Directory installed
- Some attacks require a client workstation
Supported attacks:
- Abuse of ACLs/ACEs
- Kerberoasting
- AS-REP Roasting
- Abuse of DnsAdmins
- Password in object denoscription
- Custom objects with default password (Changeme123!)
- Password spraying
- DCSync
- Silver ticket
- Golden Ticket
- Pass-the-Hash
- Pass-the-Ticket
- SMB signing disabled

https://github.com/WazeHell/vulnerable-AD

#Ad
#Lab
@NetPentester