#RedTeam_Tactics
#RedTeam
1. Auth Bypass in Google Assistant
https://feed.bugs.xdavidhu.me/bugs/0011
2. A Primer for Testing the Security of GraphQL APIs
https://blog.forcesunseen.com/a-primer-for-testing-the-security-of-graphql-apis
@BlueRedTeam
#RedTeam
1. Auth Bypass in Google Assistant
https://feed.bugs.xdavidhu.me/bugs/0011
2. A Primer for Testing the Security of GraphQL APIs
https://blog.forcesunseen.com/a-primer-for-testing-the-security-of-graphql-apis
@BlueRedTeam
feed.bugs.xdavidhu.me
Malicious webpage can execute Google Assistant commands without any permissions
xdavidhu's bug bounty disclosures.
#Offensive_security
Recon, Vulnerable Code Assessment, Exploit Automation, Bypasses & Patching all one (Python, PHP)
https://blog.riotsecurityteam.com/recon-vulnerable-code-assessment-exploit-automation-bypasses-and-patching-all-one-python-php
@BlueRedTeam
Recon, Vulnerable Code Assessment, Exploit Automation, Bypasses & Patching all one (Python, PHP)
https://blog.riotsecurityteam.com/recon-vulnerable-code-assessment-exploit-automation-bypasses-and-patching-all-one-python-php
@BlueRedTeam
#RedTeam_Tactics
#RedTeam
1. How to tamper the EDR
https://www.infosec.tirol/master-of-puppets-part-ii-how-to-tamper-the-edr
2. Bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification
https://securityonline.info/dllhijackingscanner-bypassing-uac-using-dll-hijacking
]-> PoC: https://github.com/SecuProject/DLLHijackingScanner/releases
3. Kerberoast With OpSec
https://m365internals.com/2021/11/08/kerberoast-with-opsec
@BlueRedTeam
#RedTeam
1. How to tamper the EDR
https://www.infosec.tirol/master-of-puppets-part-ii-how-to-tamper-the-edr
2. Bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification
https://securityonline.info/dllhijackingscanner-bypassing-uac-using-dll-hijacking
]-> PoC: https://github.com/SecuProject/DLLHijackingScanner/releases
3. Kerberoast With OpSec
https://m365internals.com/2021/11/08/kerberoast-with-opsec
@BlueRedTeam
#Threat_Research
TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access
https://research.nccgroup.com/2021/11/08/ta505-exploits-solarwinds-serv-u-vulnerability-cve-2021-35211-for-initial-access
@BlueRedTeam
TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access
https://research.nccgroup.com/2021/11/08/ta505-exploits-solarwinds-serv-u-vulnerability-cve-2021-35211-for-initial-access
@BlueRedTeam
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
#BlueTeam_Techniques
#BlueTeam
1. A Zeek package to detect CVE-2021-42292,
a Microsoft Excel local privilege escalation exploit
https://github.com/corelight/CVE-2021-42292
2. RPC Firewall
https://github.com/zeronetworks/rpcfirewall
@BlueRedTeam
#BlueTeam
1. A Zeek package to detect CVE-2021-42292,
a Microsoft Excel local privilege escalation exploit
https://github.com/corelight/CVE-2021-42292
2. RPC Firewall
https://github.com/zeronetworks/rpcfirewall
@BlueRedTeam
GitHub
GitHub - corelight/CVE-2021-42292: A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.
A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit. - corelight/CVE-2021-42292
Adaptive DLL hijacking/Dynamic export forwarding
https://github.com/monoxgas/Koppeling
https://github.com/monoxgas/Koppeling
GitHub
GitHub - monoxgas/Koppeling: Adaptive DLL hijacking / dynamic export forwarding
Adaptive DLL hijacking / dynamic export forwarding - monoxgas/Koppeling
#RedTeam
#BlueTeam
Red Team vs Blue Team Project for my Cyber Security Bootcamp.
URL:https://github.com/Softterier/COMPETENCIAS
@BlueRedTeam
#BlueTeam
Red Team vs Blue Team Project for my Cyber Security Bootcamp.
URL:https://github.com/Softterier/COMPETENCIAS
@BlueRedTeam
#RedTeam
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.
https://github.com/joshblack07/UR-Cyber-Security-Red_vs_Blue
@BlueRedTeam
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.
https://github.com/joshblack07/UR-Cyber-Security-Red_vs_Blue
@BlueRedTeam
GitHub
GitHub - joshblack07/UR-Cyber-Security-Red_vs_Blue: Assessment, Analysis, and Hardening of a vulnerable system. This report includes…
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies. - joshblack07/UR-...
#exploit
CVE-2021-41765:
Unauthenticated SQLi to RCE Chain
https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace
@BlueRedTeam
CVE-2021-41765:
Unauthenticated SQLi to RCE Chain
https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace
@BlueRedTeam
Horizon3.ai
Multiple Vulnerabilities in ResourceSpace
Advisory for CVE-2021-41765, a critical SQL injection vulnerability leading to remote code execution, by the Horizon3.ai red team.
#Offensive_security
The Kerberos Key List Attack:
The return of the Read Only Domain Controllers
https://www.secureauth.com/blog/the-kerberos-key-list-attack-the-return-of-the-read-only-domain-controllers
@BlueRedTeam
The Kerberos Key List Attack:
The return of the Read Only Domain Controllers
https://www.secureauth.com/blog/the-kerberos-key-list-attack-the-return-of-the-read-only-domain-controllers
@BlueRedTeam
#RedTeam
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware
https://github.com/mgeeky/UnhookMe
@BlueRedTeam
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware
https://github.com/mgeeky/UnhookMe
@BlueRedTeam
GitHub
GitHub - mgeeky/UnhookMe: UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system…
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware - mgeeky/UnhookMe