Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
YouTube
Stable 34 Attacking Azure Environments with PowerShell Karl Fosaaen
These are the videos from Derbycon 2018:
http://www.irongeek.com/i.php?page=videos/derbycon8/mainlist
Patreon:
https://www.patreon.com/irongeek
http://www.irongeek.com/i.php?page=videos/derbycon8/mainlist
Patreon:
https://www.patreon.com/irongeek
Security Talks
Attacking Azure Environments with PowerShell https://youtu.be/IdORwgxDpkw @SecTalks
MicroBurst: A collection of noscripts for assessing Microsoft Azure security
https://github.com/NetSPI/MicroBurst
@WindowsHackingLibrary
https://github.com/NetSPI/MicroBurst
@WindowsHackingLibrary
GitHub
GitHub - NetSPI/MicroBurst: A collection of noscripts for assessing Microsoft Azure security
A collection of noscripts for assessing Microsoft Azure security - NetSPI/MicroBurst
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
Icebreaker.py: Gaining a foothold in Active Directory in one command
Dan McInerney at SaintCon
https://youtu.be/1LR5u8uKO8I
@SecTalks
Dan McInerney at SaintCon
https://youtu.be/1LR5u8uKO8I
@SecTalks
YouTube
SAINTCON 2018 - Dan McInerney - Icebreaker.py Gaining a foothold in Active Directory in one command
Title: Icebreaker.py - Gaining a foothold in Active Directory in one command
Speaker: Dan McInerney
Conference: SAINTCON 2018
Location: Track 2
Date: 2018-09-27
Time: 03:00pm -- 03:30pm
Speaker: Dan McInerney
Conference: SAINTCON 2018
Location: Track 2
Date: 2018-09-27
Time: 03:00pm -- 03:30pm
Security Talks
Icebreaker.py: Gaining a foothold in Active Directory in one command Dan McInerney at SaintCon https://youtu.be/1LR5u8uKO8I @SecTalks
[Tool] Icebreaker:
Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment
https://github.com/DanMcInerney/icebreaker
@WindowsHackingLibrary
Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment
https://github.com/DanMcInerney/icebreaker
@WindowsHackingLibrary
GitHub
GitHub - DanMcInerney/icebreaker: Gets plaintext Active Directory credentials if you're on the internal network but outside the…
Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment - DanMcInerney/icebreaker
Leveraging WSUS – Part One
https://ijustwannared.team/2018/10/15/leveraging-wsus-part-one
@WindowsHackingLibrary
https://ijustwannared.team/2018/10/15/leveraging-wsus-part-one
@WindowsHackingLibrary
ijustwannaredteam
Leveraging WSUS – Part One
Hey all, After an extended hiatus, I’m back. I was waylaid with OSCE training, exam writing, and overall frustration, but I’m going to brag for a second to say I passed :). The material…
Powershell Payload Delivery via DNS using Invoke-PowerCloud
https://how.ired.team/offensive-security-experiments/payload-delivery-via-dns-using-invoke-powercloud
@WindowsHackingLibrary
https://how.ired.team/offensive-security-experiments/payload-delivery-via-dns-using-invoke-powercloud
@WindowsHackingLibrary
ired.team
Powershell Payload Delivery via DNS using Invoke-PowerCloud - Red Teaming Experiments
This lab demos a tool or rather a Powershell noscript I have written to do what the noscript says.
SharpAttack: A console for certain tasks on security assessments. It leverages .NET and the Windows API to perform its work( and cobbr_io SharpSploit). It contains commands for domain enumeration, code execution, and other fun things.
https://github.com/jaredhaight/SharpAttack
@WindowsHackingLibrary
https://github.com/jaredhaight/SharpAttack
@WindowsHackingLibrary
GitHub
GitHub - jaredhaight/SharpAttack: A simple wrapper for C# tools
A simple wrapper for C# tools. Contribute to jaredhaight/SharpAttack development by creating an account on GitHub.
Technical Rundown of WebExec
https://blog.skullsecurity.org/2018/technical-rundown-of-webexec
@WindowsHackingLibrary
https://blog.skullsecurity.org/2018/technical-rundown-of-webexec
@WindowsHackingLibrary
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
Goodbye Obfuscation, Hello Invisi-Shell: Hiding Your Powershell Script in Plain Sight
By Omer Yair at Derbycon
https://youtu.be/Y3oMEiySxcc
@SecTalks
By Omer Yair at Derbycon
https://youtu.be/Y3oMEiySxcc
@SecTalks
YouTube
Track 3 15 Goodbye Obfuscation Hello Invisi Shell Hiding Your Powershell Script in Plain Sight Omer
These are the videos from Derbycon 2018:
http://www.irongeek.com/i.php?page=videos/derbycon8/mainlist
Patreon:
https://www.patreon.com/irongeek
http://www.irongeek.com/i.php?page=videos/derbycon8/mainlist
Patreon:
https://www.patreon.com/irongeek
Security Talks
Goodbye Obfuscation, Hello Invisi-Shell: Hiding Your Powershell Script in Plain Sight By Omer Yair at Derbycon https://youtu.be/Y3oMEiySxcc @SecTalks
Invisi-Shell: Hide your Powershell noscript in plain sight. Bypass all Powershell security features
https://github.com/OmerYa/Invisi-Shell
@WindowsHackingLibrary
https://github.com/OmerYa/Invisi-Shell
@WindowsHackingLibrary
GitHub
GitHub - OmerYa/Invisi-Shell: Hide your Powershell noscript in plain sight. Bypass all Powershell security features
Hide your Powershell noscript in plain sight. Bypass all Powershell security features - OmerYa/Invisi-Shell
Forwarded from w0rk3r's Blue team Library (Jonhnathan Jonhnathan Jonhnathan)
Another Word on Delegation
https://posts.specterops.io/another-word-on-delegation-10bdbe3cd94a
@BlueTeamLibrary
https://posts.specterops.io/another-word-on-delegation-10bdbe3cd94a
@BlueTeamLibrary
Medium
Another Word on Delegation
Every time I think I start to understand Active Directory and Kerberos, a new topic pops up to mess with my head. A few weeks ago, @elad_shamir contacted @tifkin_ and myself with some ideas about…
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
If we win, we lose
Tim MalcomVetter at BlueHat v18
https://www.youtube.com/watch?v=ifCeaYShRSU
@SecTalks
Tim MalcomVetter at BlueHat v18
https://www.youtube.com/watch?v=ifCeaYShRSU
@SecTalks
YouTube
BlueHat v18 || "If we win, we lose"
Tim MalcomVetter, Walmart
We have this saying on my red team that we borrowed from the NSA Red Team: “if we win, we lose.” It reveals the dichotomy of excelling at both offense and defense. We want our Red Teams to try to win, right? Or was it Blue? The…
We have this saying on my red team that we borrowed from the NSA Red Team: “if we win, we lose.” It reveals the dichotomy of excelling at both offense and defense. We want our Red Teams to try to win, right? Or was it Blue? The…
Forwarded from w0rk3r's Blue team Library (Jonhnathan Jonhnathan Jonhnathan)
Slides: "If we win, we lose" - Using healthy competition to measure and improve security programs || BlueHat v18
https://www.slideshare.net/MSbluehat/if-we-win-we-lose-using-healthy-competition-to-measure-and-improve-security-programs
@BlueTeamLibrary
https://www.slideshare.net/MSbluehat/if-we-win-we-lose-using-healthy-competition-to-measure-and-improve-security-programs
@BlueTeamLibrary
www.slideshare.net
BlueHat v18 || "If we win, we lose" (using healthy competition to mea…
Tim MalcomVetter, Walmart We have this saying on my red team that we borrowed from the NSA Red Team: “if we win, we lose.” It reveals the dichotomy of excellin…
10 Red Teaming Lessons Learned Over 20 Years
https://www.oodaloop.com/ooda-original/2015/10/22/10-red-teaming-lessons-learned-over-20-years
@WindowsHackingLibrary
https://www.oodaloop.com/ooda-original/2015/10/22/10-red-teaming-lessons-learned-over-20-years
@WindowsHackingLibrary
OODA Loop
10 Red Teaming Lessons Learned Over 20 Years
I've been a red teamer for twenty years now, perhaps even longer, but I didn't know what to call it until 1995 when I started working with the Department of Defense. I've also been fortunate
SMB Named Pipe Pivoting in Meterpreter
https://medium.com/@petergombos/smb-named-pipe-pivoting-in-meterpreter-462580fd41c5
@WindowsHackingLibrary
https://medium.com/@petergombos/smb-named-pipe-pivoting-in-meterpreter-462580fd41c5
@WindowsHackingLibrary
Medium
SMB Named Pipe Pivoting in Meterpreter
A hidden feature of Metasploit, is the ability to add SMB Named Pipe listeners in a meterpreter session to pivot on an internal network…
On-the-Run with Empire
https://posts.specterops.io/on-the-run-with-empire-67ddde01270c
@WindowsHackingLibrary
https://posts.specterops.io/on-the-run-with-empire-67ddde01270c
@WindowsHackingLibrary
Posts By SpecterOps Team Members
On-the-Run with Empire.
During my study time for mobile application testing, I came to the realization that there are a lot of bad coding practices taking place…
Reversing ALPC: Where are your windows bugs and sandbox escapes?
https://sandboxescaper.blogspot.com/2018/10/reversing-alpc-where-are-your-windows.html
@WindowsHackingLibrary
https://sandboxescaper.blogspot.com/2018/10/reversing-alpc-where-are-your-windows.html
@WindowsHackingLibrary
Abusing PowerShell Desired State Configuration for Lateral Movement
https://posts.specterops.io/abusing-powershell-desired-state-configuration-for-lateral-movement-ca42ddbe6f06
@WindowsHackingLibrary
https://posts.specterops.io/abusing-powershell-desired-state-configuration-for-lateral-movement-ca42ddbe6f06
@WindowsHackingLibrary
Medium
Abusing PowerShell Desired State Configuration for Lateral Movement
Lateral Movement Technique Denoscription