RedTeam feed – Telegram
RedTeam feed
398 subscribers
53 photos
3 videos
1 file
845 links
RedTeam blogposts and articles collection
Download Telegram
Automating Azure App Services Token Decryption
#netspi

Discover how to decrypt Azure App Services authentication tokens automatically using MicroBurst’s tooling to extract encrypted tokens for security testing.

via NetSPI Technical Blog (author: Karl Fosaaen)
We Know What You Did (in Azure) Last Summer
#netspi

At DEF CON 33, NetSPI presented a talk about how Azure resources supporting Entra ID authentication expose tenant IDs, enabling attackers to attribute cloud resources to specific organizations at scale.

via NetSPI Technical Blog (author: Karl Fosaaen)
Decrypting VM Extension Settings with Azure WireServer
#netspi

The Azure WireServer service provides configuration data to Azure Virtual Machines. Join us as we walkthrough the process of decrypting that data to find sensitive information.

via NetSPI Technical Blog (author: Karl Fosaaen)
SCCM Hierarchy Takeover via Entra Integration…Because of the Implication
#specterops

TL;DR SCCM sites (prior to KB35360093) integrated with Entra ID can be abused to compromise the entire hierarchy. Introduction Despite several attempts to convince myself that “I’m done with SCCM”, here we are again. Last time, I wrote about abusing the Management Point’s role in the SCCM site database to recover and decrypt credentials from […]

via SpecterOps Blog (author: Garrett Foster)
Fortinet FortiWeb Authentication Bypass – CVE-2025-64446
#bishopfox

Bishop Fox researchers discovered an authentication bypass in FortiWeb that lets attackers add their own admin accounts, take over the device, and erase evidence. Organizations can quickly check if they’re exposed using a new Bishop Fox scanner and should remove public access and update immediately.

via BishopFox Blog
PICing AOP
#rastamouse

The 11.10.25 Crystal Palace release added more new commands in one go than I think I've seen thus far. Many of them seemed really similar at first blush, and it took me a while to get an understanding of where each one is applicable (I failed

via Rasta Mouse Blog
An Evening with Claude (Code)
#specterops

TL;DR – A new vulnerability was found one evening in Claude Code (CVE-2025-64755). I’d love to start this blog post with something really click-baity (“How I pwn3d Claude Code using ChatGPT Codex” or something similar to bring some interest) but, alas, it was not meant to be. This blog post explores a bug I found […]

via SpecterOps Blog (author: Adam Chester)
Reflecting Your Authentication: When Windows Ends Up Talking to Itself
#decoder

Authentication reflection has been around for more than 20 years, but its implications in modern Windows networks are far from obsolete. Even after all the patches Microsoft has rolled out over the years, reflection attacks are still very much exploitable 😉 This post walks through what authentication reflection actually is, why it remains dangerous today,…

via Decoder's Blog
Restoring Reflective Code Loading on macOS (Part II)
#objectivesee

Let's continue our research into fully restoring reflective code loading on macOS — now with support for macOS 26 and in-memory Objective-C payloads. And what about detection? We cover that too!

via Objective-See Blog
Cobalt Strike 4.12: Fix Up, Look Sharp!
#cobaltstrike

Cobalt Strike 4.12 is now available. We are excited to introduce a new look and feel for the Cobalt Strike GUI, a REST API, User Defined Command and Control (UDC2), new process injection options, new UAC bypasses, a new BOF API BeaconDownload for in-memory buffers, and new drip loading Malleable C2 options.   Additionally, we have overhauled pivot Beacons so that they now support the novel Sleepmask introduced in 4.11, fixed [...]

via Cobalt Strike Blog (author: William Burgess)
1
A Note on AI from Christie Terrill, CISO, Bishop Fox
#bishopfox

After a month of conferences and CISO conversations, one thing is clear: AI is reshaping security—fast. But the excitement comes with uncertainty, risk, and big unanswered questions. Here’s what leaders are really saying.

via BishopFox Blog
Evilginx Pro 4.3 - Event Notifications & Proxies Overhaul
#kgretzky

The newest 4.3 update delivers real-time event notifications, an overhaul of the tunnelling proxy system and a new CSS canary token evasion.

via BREAKDEV Blog (author: Kuba Gretzky)
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey
#synacktiv

via Synacktiv Blog (author: Webmaster)
An Evening with Claude (Code)
#xpn

A deep dive into discovering CVE-2025-64755, a vulnerability in Claude Code v2.0.25. This post walks through the process of reversing the obfuscated Claude Code JavaScript, and exploiting weak regex expressions to achieve code execution unprompted.

via XPN InfoSec Blog
Cracking the Crystal Palace
#rastamouse

If you follow this blog, you'll know I've been posting about Crystal Palace a LOT recently, mostly from an attack perspective. Today, I thought I'd channel my blue-teamer alter ego and look at Crystal Palace from a defence perspective. That is, are there any

via Rasta Mouse Blog
Less Praying More Relaying – Enumerating EPA Enforcement for MSSQL and HTTPS
#specterops

Identifying EPA enforcement for more popular rel

via SpecterOps Blog (author: Nick Powers)
PortSwigger x TryHackMe: Supporting Advent of Cyber
#portswigger

Every December, TryHackMe’s Advent of Cyber brings the security community together around a simple idea: learn something new by getting hands-on. Each day during the festive season reveals a beginner-

via PortSwigger Blog
Release Out: Finally, Some REST
#cobaltstrike

The REST API was a major feature of the 4.12 release and forms part of a broader ongoing change in the Cobalt Strike ecosystem. Therefore, we wanted to dedicate a blog post to explain the rationale behind it, discuss the architecture, and provide hands-on examples to get our customers up and running. In addition to [...]

via Cobalt Strike Blog (author: Pieter Ceelen)
PIC Symphony
#rastamouse

Raffi just released another update to Crystal Palace, which serves to improve the way specification files are handled by making them more modular.
Tradecraft Orchestration in the Garden
What’s more relaxing than a beautiful fall day, a crisp breeze, a glass of Sangria, and music from the local


via Rasta Mouse Blog
2025 Winter Challenge: Quinindrome
#synacktiv

via Synacktiv Blog (author: Webmaster)
What Will Shape Cybersecurity in 2026: AI Speed, Expanding Attack Surfaces, and Specialized Red Teams
#bishopfox

2026 will hit cybersecurity like a fast-forward button: AI moves quicker than governance, attack surfaces sprawl into the physical world, and red teams get hyper-specialized. Here’s what’s coming—and how to stay ahead before “optional” becomes “too late.”

via BishopFox Blog