Masthash

#redteam

Sampath Pāṇini ®
2 hours ago
BC Security
2 days ago

🚨 Last Chance Alert! 🚨
Today is the FINAL DAY to sign up for Advanced Threat Emulation: Red Teams! Don't miss this opportunity to elevate your cybersecurity skills. The class begins TOMORROW!
https://www.bc-security.org/event/advanced-threat-emulation-red-teams-8/
#cybersecurity #RedTeam #infosec

Habr
3 days ago

Рассматриваем мифический фреймворк C2 Mythic. Часть 1

Всех приветствую, на связи лаборатория кибербезопасности AP Security. В этой статье мы продолжим разбирать C2-фреймворки. На этот раз, мы будем изучать относительно новый фреймворк под названием Mythic . Приятного прочтения!

https://habr.com/ru/articles/778454/

#pentest #fraimwork #redteam

Aloïs Thévenot :verified:
6 days ago

Tricard - Malware Sandbox Fingerprinting: https://therealunicornsecurity.github.io/Tricard/ #redteam

Aloïs Thévenot :verified:
6 days ago

The Elastic Container Project for Security Research - https://www.elastic.co/security-labs/the-elastic-container-project #redteam

Aloïs Thévenot :verified:
6 days ago

Flying Under The Radar – An Introductory Guide To Bypassing Microsoft Defender For Identity Detections - https://www.whiteoaksecurity.com/blog/bypassing-microsoft-defender-for-identity-detections/ #redteam

Nettitude Labs (@nettitude_labs) just released Tartarus-TpAllocInject, a loader for bypassing Endpoint Detection and Response (EDR) solutions using the Tartarus' Gate method.

💥⁠https://github.com/nettitude/Tartarus-TpAllocInject :github:

This is a simple loader that uses indirect syscalls via the Tartarus' Gate method. This loader executes shellcode with an known WINAPI CreateThreadPoolWait but I have changed things a little bit and instead, I call the underlying Tp* APIs from Ntdll.dll.

Method evolution:
Tartarus' Gate
⬆️ Halo's Gate
⬆️ Hell's Gate

#InfoSec #CyberSecurity #RedTeam #EDRbypass

Aloïs Thévenot :verified:
1 week ago

avred - Analyse your malware to surgically obfuscate it: https://github.com/dobin/avred #redteam

Mathilde Saliou
1 week ago

Dans #Next : des chercheurs ont élaboré une technique d’extraction des données d’entrainement de ChatGPT

#IA #redteam
https://next.ink/118351/extraction-donnees-entrainement-ia-generatives-attaque-chatgpt/

Aloïs Thévenot :verified:
1 week ago
Constantin Milos
1 week ago

Red Team Maturity: Measuring, Reporting On, and Planning For Red Team Maturity #redteam
https://www.redteammaturity.com/release-blog

Milos Constantin
1 week ago

Red Team Maturity: Measuring, Reporting On, and Planning For Red Team Maturity #redteam
https://www.redteammaturity.com/release-blog

Buttered Jorts
1 week ago

What are the odds I know someone with both a Sparrows Chaos Card and a pair of digital calipers?

#RedTeam #PenTesting #LockSport

Astra Kernel :verified:
2 weeks ago

🪲NtlmThief: Extracting NetNTLM without touching lsass.exe

👉 a C++ implementation of the Internal Monologue attack

👉 It allows to get NetNTLM hashes of users using SSPI

https://github.com/MzHmO/NtlmThief

#infosec #programming #Pentesting #redteam

usage of the tool
Luke Switzer
2 weeks ago

Shifting from Blue to #RedTeam? Consolidating private #offsec and #hardware notes.

Includes payloads, automation scripts, tools and references for 2024: https://github.com/Root-Down-Digital/pentesting-resources

Ringzer0
2 weeks ago
Taggart :donor:
2 weeks ago

Looks like a fantastic #redteam training tool: an open source "EDR" that demonstrates common defensive techniques such as API Hooking, allowing both offense and defense to understand how these applications work (and don't).

https://xacone.github.io/BestEdrOfTheMarket.html
https://github.com/Xacone/BestEdrOfTheMarket

0xor0ne
3 weeks ago

A couple of blog posts for learning about Linux process injection (specifically sshd injection for credential harvesting)

https://blog.xpnsec.com/linux-process-injection-aka-injecting-into-sshd-for-fun/

https://jm33.me/sshd-injection-and-password-harvesting.html

#processinjection #redteam #cybersecurity

Cory Doctorow
3 weeks ago

The purpose of a code of conduct isn't merely to prevent people from accidentally misstepping - it's to prevent malicious parties from corrupting the judicial process. To evaluate the code, we should #RedTeam it: imagine what harms a corrupt judge or a corrupting billionaire would be able to effect while staying within the bounds the code sets.

Seen in that light, the code is wildly defective and absolutely not fit for purpose.

12/

KyanHexagon
3 weeks ago
Ringzer0
3 weeks ago
ThatNateGuy :verified:
4 weeks ago

Why did I wait so long to learn about and experiment with #bloodhound ?

#activedirectory #redteam #blueteam

John Leonard
1 month ago

Red teamers hurdle AI guardrails

Demonstrates 'importance of including scientists in AI quality and safety assessments'

https://www.computing.co.uk/news/4142535/red-teamers-hurdle-ai-guardrails

#ai #technews #redteam #infosec

🌱 Ligniform :donor:​
1 month ago

Really heavily considering getting more into #RedTeam stuff. Looking at the CEH 👀​
Anyone recommend it/have opinions? Happy to hear anything

Taylor Parizo
1 month ago

@anton_chuvakin This is exactly how I'm planning to expand our CTI Tactical team. Working at the silo problem is real. Especially between us and our DE team. There's some ongoing collaboration with red team on a quarterly basis but DE is the next step. To expand current reporting, I've been incorporating D3FEND and CAR to give at least some guidance and provide my own deeper knowledge of some techniques but that's obviously not a requirement of all analysts. The goal there is for reporting to indicate defensive coverage and outline any control gaps we may face.

Any recommendations as to what sufficient data should look like from us from say a process injection technique? But I guess I could also wait for the next blog post "assuming you get nice intelligence, how to break it into detections?" :)
#RedTeam #DetectionEngineering #ThreatIntel

Tim (Wadhwa-)Brown :donor:
1 month ago

With a fair wind behind us, we'll see an updated @mitreattack matrix later today.

#att&ck, #redteam, #blueteam, #threatintel

John Leonard
1 month ago

The social engineering of the self: How AI chatbots manipulate our thinking

My interview with red teamer Rumman Chowdhury (free registration)

https://www.computing.co.uk/interview/4139201/social-engineering-self-ai-chatbots-manipulate-thinking

#ai #technews #infosec #redteam #chatbot #bias

Carlos Mogas da Silva
1 month ago

anyone knows where to get Rubber Duckys on the EU?

#rubberducky #pentesting #pentest #redteam

Tim (Wadhwa-)Brown :donor:
1 month ago

@whatshisface talks the future of ATT&CK for Linux as part of his yearly update at ATT&CKCon...

#att&ck, #redteam, #blueteam, #threatintel, #linux

Adam Pennington talks the future of ATT&CK for Linux as part of his yearly update at ATT&CKCon
the grugq
2 months ago

What are the current best Win7 eternal-day? #redteam #offensivecyber

Tim (Wadhwa-)Brown :donor:
2 months ago

Notable that FiGHT 2.0 is out: https://fight.mitre.org. New techniques include attacks on O-RAN, 5G, and UE.

#fight, #redteam, #blueteam, #telco

ath0
2 months ago

Any CS operators have pointers to Linux beacons? I’m getting ready for CRTO and was doing an HtB lab as prep—but initial compromise is a linux box! LOL. #RedTeam #InfoSec #CobaltStrike

Taylor Parizo
2 months ago

Evading EDR Final edition is finally out! I got the book during early access and it was amazing. My first real dive into EDRs so some concepts were over my head but I plan to revisit it now that I’ve had more experience since then. #EDR #RedTeam #PurpleTeam

https://nostarch.com/evading-edr

Sampath Pāṇini ®
2 months ago

@shoq

That was some premium #RedTeam thinking right there ☝️

We need more of that.

Astra Kernel :verified:
2 months ago

✨ The CVE-2023-44487 vulnerability was already reported in March 2022 with POC and got fixed in Rust Hyper crate (CVE-2023-26964)

#infosec #dfir #redteam #pentesting #security

https://infosec.exchange/@AstraKernel/111214244487116346

Dan Staples :donor:
2 months ago

My red teaming platform Molotov is finally feature complete! This thing has it all: a multi-user team server with a slick web UI built in React, all of the C2 features are scriptable via API, custom stagers and payloads for Windows, Linux, and Mac, a flagship agent with a bunch of tunable EDR-evasion and code injection techniques, synchronous and asynchronous C2 protocols, relaying and pivoting (say goodbye to proxychains!), a bunch of custom post-exploitation modules for things like cred dumping and privesc, and more.

Next up: testing, documentation, and eventually some demo vids!

#redteam #pentesting #offensivesecurity #malware #c2

Brock
2 months ago

...and now I've got two #RTFM Red Team Field Manuals! #raffle giveaway maybe? #redteam

Ken N. @ BlueHat 🌻
2 months ago

Red teamers are enjoyable to work with. They are always willing to compromise. #infosec #redteam #humor

Taggart :donor:
2 months ago

Hey redteamers, in case you haven't been following the drama with Crackmapexec, well, you may want to bookmark this fork of the project, as Porchetta Industries is shutting down and the development future seems uncertain. This fork is from the active devs. https://github.com/Pennyw0rth/NetExec

#InfoSec #CyberSecurity #RedTeam

Denny Fischer
3 months ago

Amazing blog post from TrustedSec about Okta for Red Teamers. Great work!

https://www.trustedsec.com/blog/okta-for-red-teamers/

#infosec #pentesting #redteam

Dan Staples :donor:
3 months ago

I am in the job market for a remote red team or offensive security engineer role. I am seasoned full-stack software developer, a OSCP-certified pentester (currently working on CRTO), and system administrator with plenty of cloud experience.

Before my current role leading the IT & Cybersecurity team at NNAF, I did security research (including developing an improved reflective DLL injection technique [0] that helped inspire the widely used sRDI project [1][2] and has been cited by academics and other security researchers [3][4][5]) and performed pentesting and appsec for a variety of clients from global hedge funds to healthcare to aerospace engineering. Prior to that I did low-level embedded firmware development and experimental research for a wireless mesh networking platform.

For the last year I have been building an advanced, fully-featured red teaming/adversary simulation platform (which I am happy to demo for potential employers), including a web-based multi-user team server, scriptable API, a cross-platform flagship agent with novel evasion techniques, a variety of cross-platform payloads and stagers, relaying and pivoting, and an easily-extensible set of C2 protocols, both synchronized and asynchronous.

I am an excellent verbal and written communicator, comfortable translating highly technical topics for a variety of audiences from executives to engineers, and have consistently produced high quality reports for clients. I have experience programming in almost a dozen languages and am quick to learn new technologies.

Boosts appreciated!

[0] https://disman.tl/2015/01/30/an-improved-reflective-dll-injection-technique.html
[1] https://www.netspi.com/blog/technical/adversary-simulation/srdi-shellcode-reflective-dll-injection/
[2] https://github.com/monoxgas/sRDI
[3] https://www.oic-cert.org/en/journal/pdf/1/1/116.pdf
[4] https://euskalhack.org/securitycongress/PDF/Understanding_a_payload's_life.pdf
[5] https://posts.specterops.io/merlin-v0-7-0-release-roll-up-717739cde77a

#infosecjobs #redteam #redteaming #pentesting #fedihire #FediHired #jobs #jobhunting #JobSearch #malware #malwaredev #maldev #hireme

David Jones
3 months ago

So any airline (presumably) can submit a flight plan to NATS, and they can be formatted in a way which locks-up the system. What does Red Team say about this?

And let's say NATS in the UK is now hardened against this. What about every other air traffic control system in the world?

#NATS #RedTeam

Tim (Wadhwa-)Brown :donor:
3 months ago

This week in Linux red vs blue land:

https://github.com/timb-machine/linux-malware/compare/main@%7B7day%7D...main

Including:

* @reversinglabs reports a sighting of a new malware family called Spirit or Gwisin
* We independently found a copy of Spirit in GitHub as left overs from an unknown DFIR investigation and snarfed it for the repo
* We've added samples of Conti and Merlin (see https://infosec.exchange/@timb_machine/110957806917291066)
* We also have a MESSAGETAP sample to examine
* New XMRig sightings
* Reviewing last weeks articles from Intel471 and BlackBerry's comparisons of Conti and Monti yields nothing Linux specific :(
* There are however some fresh insights from other quarters on the same topic
* @signalblur discusses Linux ransomware
* My colleagues at @TalosSecurity report that the North Koreans are using DeimosC2
* We've added references to a couple more tools and techniques
* We've spotted another piece of malware bind mounting /proc...

#linux, #redteam, #blueteam, #threatintel

Bex Markwick
4 months ago

Hi Red Team buddies, I have a bit of a sad one I'm afraid.

A friend died around New Years. She ran a business and her family are now getting in contact with me at the cyber person they know because they can't get into her computer.

I've had a look at it, but I can't get into it via normal means because the phone contract is cancelled (7 months ago) and the family have accidentally locked everyone out of the phone.

So at this point, I'm out of anything except reaching out to you all and hoping someone knows a Red Team person/company that may be able to get into a Macbook. It's getting quite important because all of the business info is on it. I don't do Apple stuff, and I don't have any sort of set up for this.

She was a great friend and is dearly missed and I'd love to be able to help take some pressure and stress away from her family.

Preferably UK based and happy to chat further if more info is needed.

#infosec #redteam

Tim (Wadhwa-)Brown :donor:
4 months ago

That time of the week when I run update-repo.sh.

#linux, #redteam, #blueteam, #threatintel

4 months ago

OooOk Fediverse,

what's the best way to follow
#defcon from afar if you don't have a Twitter account. Who to follow on Fediverse. Is there great blogs? Perhaps livestreams on YouTube or twitch?

Please boost
🥳

#askfedi #askfedivers #askmsatodon #infosec #opsec #itsec #redteam #blueteam

Tedi Heriyanto
4 months ago
BSidesAugusta
5 months ago

Tickets for #BSidesAugusta0xA OPENS TODAY AT NOON EST. BSidesAugusta.org/tickets (Get Tickets). #cyber #csra #AugustaGA #cybersecurity #InfoSec #blueteam #redteam #purpleteam

Hacker Memes
6 months ago

when a target clicks a phishing link

#redteam #meme #whereblue

american dad - klaus the goldfish: cheering at laptop screen
Simple Nomad :verified:
6 months ago

I work at #GitLab who is currently hiring for their #RedTeam. GitLab is #AllRemote so if you like working #remote you'll love this place.

If we actually know each other, let me know when you apply and I'll put in a good word for you. Qualifications and other details in the link.

#infosec #hacker

https://boards.greenhouse.io/gitlab/jobs/6776722002

Eric Mann
6 months ago

Anyone in the #fediverse looking for a contract #redteam exercise? I'd love to hack your stuff (with permission) and promise to tell you how to fix it afterwards ;-)

This is my wallet sized covert entry EDC. All the bypass tools at the bottom fit in the back of the larger lock pick case. The smaller set in the top left is hidden in a second spot inside my wallet. I've been expanding capabilities over time as I've been learning about this profession and plan a few more additions from this point. Thanks for open sourcing your knowledge @deviantollam! #InfoSec #PhySec #RedTeam #CovertEntry

Pseudo Nym
7 months ago

Google registrar has opened up ".zip" as a TLD.

Has anyone grabbed "bonus.zip" and "payroll.zip" and "salary.xls.zip" yet?

#infosec shenanigans
#redTeam start your engines

https://www.iana.org/domains/root/db/zip.html

Tinker ☀️
7 months ago

Client: Could you scan these devices and look for ones that still use default credentials?

Me: Sure! That's a solid audit.

Client: Here's 40,000 IP addresses...

Me: I guess... I guess this is my life now.

#infosec #redteam #hacking (kinda)

KyanHexagon
8 months ago

"ScareCrow 5.0 is out now, a massive rewrite of the framework with huge new features, IoC's removed & new evasion techniques added. If you are curious take a look at the changelog. Check it out: github.com/optiv/ScareCrow #netsec #redteam #EDR #evasion"

Need a quick way to check a hash against a huge database?

I've written a small but flexible Go CLI tool to query the HashMob API.

It's actually pretty damn handy if I do say so myself.

If you find it useful, stars and boosts are much appreciated ❤️

https://github.com/n0kovo/gohashmob

(just starting to learn Go, don't judge my probably horrible code 🥹)

#hacking #infosec #tools #osint #passwordcracking #passwords #passwordsecurity #hashcracking #hashlookup #hashmob #md5 #sha1 #bcrypt #pentesting #bugbounty #redteam

Tinker ☀️
8 months ago

So no lie... being part of an internal red team and seeing the things that I could hack into last month being fixed this month and not being able to hack into it next month in the same way is awesome.

But you know what's even more awesome?!?! Having the Blue Team contact you on a intrusion alert, verifying that it was not you, and then running off to track down and stop the intruder...

...and realizing that the alert was developed because of your efforts demonstrating what those attacks look like during Purple Teams.

I never had this level of satisfaction and fulfillment during my 3rd Party PenTest consultant days.

#InfoSec #RedTeam #BlueTeam #PurpleTeam

Eric Carroll
8 months ago

The phrase "it gets worse" shows up way too often in these encounters.

#redteam #infosec by #llm

A novice just used #ChatGPT to create terrifyingly sophisticated malware

https://www.androidauthority.com/chatgpt-malware-3310791/

A self-proclaimed novice says that he created zero-day malware using only ChatGPT. The data mining malware is nearly undetectable.

operat0r
8 months ago

Moved Bloodhound Portable active directory tool to JAMBOREE !! Now you can pwn Android and your AD at the same time 🥳🤪🤣😇🙄

Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE)

https://github.com/freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy

#blueteam #redteam #hacking #android #BloodHoundEnterprise

Tinker ☀️
8 months ago

You ever just dump the local SAMs on every single workstation and server in an entire environment and see the craziest accounts?

Like... what is this "backdoor" local admin account for?

And on these 20 systems over there, there's a lot of "h4x0r1337" local admin accounts with the same password on all of them....

Anyhow. I'm sure IT has their reasons.

#infosec #hacking #blueteam #redteam #sysadmin