Network Penetration Testing – Telegram
Network Penetration Testing
1.03K subscribers
40 photos
3 videos
12 files
269 links
[ Network Penetration Testing & Cloud ]

Any misuse of this info will not be the responsibility of the author, educational purposes only.


@NetPentester
Download Telegram
MITRE ATT&CK TTP’s used by LAPSUS$

Two interesting techniques used by LAPSUS$ (Code Signing, Disable, and Modify Tools)

#MITRE
@NetPentesters
Vulnerable Active Directory
Create a vulnerable AD that will allow you to test most AD attacks in a local lab

Main characteristics:
- Random attacks
- Full coverage of the listed attacks
- it is necessary to run the noscript in DC with Active Directory installed
- Some attacks require a client workstation
Supported attacks:
- Abuse of ACLs/ACEs
- Kerberoasting
- AS-REP Roasting
- Abuse of DnsAdmins
- Password in object denoscription
- Custom objects with default password (Changeme123!)
- Password spraying
- DCSync
- Silver ticket
- Golden Ticket
- Pass-the-Hash
- Pass-the-Ticket
- SMB signing disabled

https://github.com/WazeHell/vulnerable-AD

#Ad
#Lab
@NetPentesters