I've made some long awaited updates to SQLRecon! Here's a couple of videos highlighting some of the big additions.
Tool: github.com/xforcered/SQLR…
Check out this thread ⬇️
Red Teamers: Spicy Shadow attack--users can't write to their own `msDS-KeyCredentialLink` by default, but computers can. PetitPotam + ntlmrelayx.py= machine takeover via Shadow the Hedgehog.
ntlmrelayx -t ldap://DC.fqdn --shadow-credentials --shadow-target 'TGT$'
1/2
Who's ready for an 81-minute read? Only just finished the extremely preliminary draft. I kinda regret going this deep down this rabbit hole 🫠
I'm always happy/down to co-author research projects and publish with community members ❤️ just reach out!
It's been quiet for a while around bloodhound Python, however I'm happy to share that I am now maintaining the project at my personal GitHub. The latest version fixes many bugs/issues, also thanks to the many PRs that were submitted (thanks all!). github.com/dirkjanm/blood…
Happy New Year everyone and big thanks for all your support!
We’re kicking off the new year with a medium-level Active Directory chain by @k0zmer . This one's packed with the kind of software and configurations you'd bump into in enterprise networks.
🚨 Red Teamers! Found out your target is an AWS or GSuite aficionado?
Perfect! Here's how to bypass MOTW with finesse. 🕵️♂️
1️⃣ Plant your payload in a Google Cloud Bucket or AWS S3.
2️⃣ Grab the URL:
AWS:⛈️ https://[bucket_name].s3.amazonaws.com/[object_name]/evil.exe
GCP: ⛅️…
Calling all Red Teamers 🚨
Today we are introducing Tartarus-TpAllocInject, a new OPSEC-safe loader and technique for bypassing EDR solutions, by @trickster012labs.nettitude.com/blog/creating-…
A new Red Team Lab, Shiva, is coming to Vulnlab next week! This time you get to test a hardened Hybrid-AD environment that involves:
- Hybrid-AD with 10+ machines & active users
- Cloud exploitation
- SIEM, EDR on Clients & Servers
- Common enterprise software
- No CVEs
I found out "C:\Windows\System32\WorkFolders.exe" (signed by MS) can be used to run arbitrary executables in the current working directory with the name control.exe. It's like a new rundll32.exe #lolbin but for EXEs!
Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n
#Offsec#SoftwareExploitation#REexploitation.ashemery.com
My Okta for Red Teamers post is up! We look at how Kerberos SSO works, how to intercept credentials via a fake AD Agent, decrypting AD Agent tokens, adding skeleton key's, and even how to deploy a janky SAML IdP server to auth as any user for good measure. trustedsec.com/blog/okta-for-…
Bypassing Crowdstrike Falcon EDR hooks with targeted algo, decomposing agent's hooking logic.
Although extremely Falcon-specific, nevertheless good exercise for any maldev.
Great work, @inbits_sec!
#redteaminbits-sec.com/posts/in-memor…
3 Followers 169 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/HFml9GioTd
568 Followers 199 Followingv37r1x@yuma:~$ cat whoami.txt
Yuma | 21 | He/Him | 🏳️⚧️ |
Top 20 HTB | Top 1 in UK | Former SRT |
Leading 🚩 @Th3BlackKn1ghts |
7K Followers 2K FollowingGlobal leader in hands-on learning for enterprise and cloud security education. Join 40000+ infosec professionals from 130+ countries
57 Followers 554 Following🇧🇷 Patriota & Conservador - No meu Twitter existe duas opiniões a Minha e sua que está errada.
Minha bandeira jamais será vermelha e nem de cor de Arco-íris
590 Followers 594 FollowingWannabe Red Teamer | OSEP | OSCP | Cybersecurity Consultant | Community Moderator/Advisor @offsectraining | I follow shit ton of illustrators | Views are my own
120K Followers 101K FollowingFreestyle rapper, everything's temporary so make it worth it. Know your worth, prove your worth. Thee most hated,far from average. lielow life
27 Followers 109 FollowingOverwatch, League of Legends, Hearthstone, PKMN casual gamer. IGN: RayneRaven [PC|PS4]. Naruto & AttackOnTitan addict. Fan of King Noctis •FFXV•
10K Followers 660 FollowingI'm Bia! Super into Hacking, Election Security and teaching STEAM! 🦄
Founder, CEO
https://t.co/qiMa7wraK6 https://t.co/FWs4dKV3Ys
188K Followers 6K FollowingThe leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
235K Followers 1K FollowingCofounder @hackinghub_io | Advisor @CaidoIO. I hack companies and make content about it. #NahamCon organizer. ex @hacker0x01🇮🇷
7K Followers 2K FollowingGlobal leader in hands-on learning for enterprise and cloud security education. Join 40000+ infosec professionals from 130+ countries
4K Followers 2K Followingjust a french canadien | ai red team @HiddenLayerSec | CISSP BSCP CRTL CRTO OSCP eWPTX eCPPT | goofing off @ https://t.co/aWC0YYEp9x
590 Followers 594 FollowingWannabe Red Teamer | OSEP | OSCP | Cybersecurity Consultant | Community Moderator/Advisor @offsectraining | I follow shit ton of illustrators | Views are my own
568 Followers 199 Followingv37r1x@yuma:~$ cat whoami.txt
Yuma | 21 | He/Him | 🏳️⚧️ |
Top 20 HTB | Top 1 in UK | Former SRT |
Leading 🚩 @Th3BlackKn1ghts |
No recent Favorites. New Favorites will appear here.