#RedTeam_Tactics
#Redteam
1. Chrome Exploitation:
An old but good case-study
https://blog.haboob.sa/blog/chrome-exploitation-an-old-but-good-case-study
2. DCOM abuse and lateral movement with Cobalt Strike
https://www.pentestpartners.com/security-blog/dcom-abuse-and-lateral-movement-with-cobalt-strike
@BlueRedTeam
#Redteam
1. Chrome Exploitation:
An old but good case-study
https://blog.haboob.sa/blog/chrome-exploitation-an-old-but-good-case-study
2. DCOM abuse and lateral movement with Cobalt Strike
https://www.pentestpartners.com/security-blog/dcom-abuse-and-lateral-movement-with-cobalt-strike
@BlueRedTeam
#BlueTeam_Techniques
#BlueTeam
A methodology for mapping MITRE ATT&CK
techniques to vulnerability records to describe
the impact of a vulnerability
https://github.com/center-for-threat-informed-defense/attack_to_cve
@BlueRedTeam
#BlueTeam
A methodology for mapping MITRE ATT&CK
techniques to vulnerability records to describe
the impact of a vulnerability
https://github.com/center-for-threat-informed-defense/attack_to_cve
@BlueRedTeam
GitHub
GitHub - center-for-threat-informed-defense/attack_to_cve: 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings…
🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive. - center-for-threat-informed-defense/attack_to_cve
#RedTeam_Tactics
#RedTeam
1. Auth Bypass in Google Assistant
https://feed.bugs.xdavidhu.me/bugs/0011
2. A Primer for Testing the Security of GraphQL APIs
https://blog.forcesunseen.com/a-primer-for-testing-the-security-of-graphql-apis
@BlueRedTeam
#RedTeam
1. Auth Bypass in Google Assistant
https://feed.bugs.xdavidhu.me/bugs/0011
2. A Primer for Testing the Security of GraphQL APIs
https://blog.forcesunseen.com/a-primer-for-testing-the-security-of-graphql-apis
@BlueRedTeam
feed.bugs.xdavidhu.me
Malicious webpage can execute Google Assistant commands without any permissions
xdavidhu's bug bounty disclosures.
#Offensive_security
Recon, Vulnerable Code Assessment, Exploit Automation, Bypasses & Patching all one (Python, PHP)
https://blog.riotsecurityteam.com/recon-vulnerable-code-assessment-exploit-automation-bypasses-and-patching-all-one-python-php
@BlueRedTeam
Recon, Vulnerable Code Assessment, Exploit Automation, Bypasses & Patching all one (Python, PHP)
https://blog.riotsecurityteam.com/recon-vulnerable-code-assessment-exploit-automation-bypasses-and-patching-all-one-python-php
@BlueRedTeam
#RedTeam_Tactics
#RedTeam
1. How to tamper the EDR
https://www.infosec.tirol/master-of-puppets-part-ii-how-to-tamper-the-edr
2. Bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification
https://securityonline.info/dllhijackingscanner-bypassing-uac-using-dll-hijacking
]-> PoC: https://github.com/SecuProject/DLLHijackingScanner/releases
3. Kerberoast With OpSec
https://m365internals.com/2021/11/08/kerberoast-with-opsec
@BlueRedTeam
#RedTeam
1. How to tamper the EDR
https://www.infosec.tirol/master-of-puppets-part-ii-how-to-tamper-the-edr
2. Bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification
https://securityonline.info/dllhijackingscanner-bypassing-uac-using-dll-hijacking
]-> PoC: https://github.com/SecuProject/DLLHijackingScanner/releases
3. Kerberoast With OpSec
https://m365internals.com/2021/11/08/kerberoast-with-opsec
@BlueRedTeam
#Threat_Research
TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access
https://research.nccgroup.com/2021/11/08/ta505-exploits-solarwinds-serv-u-vulnerability-cve-2021-35211-for-initial-access
@BlueRedTeam
TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access
https://research.nccgroup.com/2021/11/08/ta505-exploits-solarwinds-serv-u-vulnerability-cve-2021-35211-for-initial-access
@BlueRedTeam
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
#BlueTeam_Techniques
#BlueTeam
1. A Zeek package to detect CVE-2021-42292,
a Microsoft Excel local privilege escalation exploit
https://github.com/corelight/CVE-2021-42292
2. RPC Firewall
https://github.com/zeronetworks/rpcfirewall
@BlueRedTeam
#BlueTeam
1. A Zeek package to detect CVE-2021-42292,
a Microsoft Excel local privilege escalation exploit
https://github.com/corelight/CVE-2021-42292
2. RPC Firewall
https://github.com/zeronetworks/rpcfirewall
@BlueRedTeam
GitHub
GitHub - corelight/CVE-2021-42292: A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.
A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit. - corelight/CVE-2021-42292
Adaptive DLL hijacking/Dynamic export forwarding
https://github.com/monoxgas/Koppeling
https://github.com/monoxgas/Koppeling
GitHub
GitHub - monoxgas/Koppeling: Adaptive DLL hijacking / dynamic export forwarding
Adaptive DLL hijacking / dynamic export forwarding - monoxgas/Koppeling
#RedTeam
#BlueTeam
Red Team vs Blue Team Project for my Cyber Security Bootcamp.
URL:https://github.com/Softterier/COMPETENCIAS
@BlueRedTeam
#BlueTeam
Red Team vs Blue Team Project for my Cyber Security Bootcamp.
URL:https://github.com/Softterier/COMPETENCIAS
@BlueRedTeam
#RedTeam
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.
https://github.com/joshblack07/UR-Cyber-Security-Red_vs_Blue
@BlueRedTeam
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.
https://github.com/joshblack07/UR-Cyber-Security-Red_vs_Blue
@BlueRedTeam
GitHub
GitHub - joshblack07/UR-Cyber-Security-Red_vs_Blue: Assessment, Analysis, and Hardening of a vulnerable system. This report includes…
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies. - joshblack07/UR-...