RedTeam feed
462 subscribers
67 photos
3 videos
1 file
1K links
RedTeam blogposts and articles collection
Download Telegram
Introducing STAR-FS
#mdsec

March, 2024 Last week, the Bank of England announced the introduction of a new regulatory framework, STAR-FS, to support the financial sector in its cyber resilience operations. Over 4 years...

via MDSec Blog (author: Admin)
How Just-Metadata Reinvents IP Analysis
#redsiege

Tool developed by: Chris Truncer Cracking the Code with Just-Metadata Imagine trying to solve a giant puzzle where each piece is hidden in a massive digital world. That’s what dealing […]

via RedSiege Blog (author: Red Siege)
Navigating Active Directory Security with EDD
#redsiege

Tool developed by: Chris Truncer   Leverage EDD for Advanced Offensive Strategies EDD serves as a critical tool for offensive security professionals, enhancing domain reconnaissance with .NET efficiency. It facilitates a […]

via RedSiege Blog (author: Red Siege)
From Chaos to Clarity: Organizing Data With Structured Formats
#trustedsec

About a year ago, we introduced a logging utility into our internal tooling on the Targeted Operations team to standardize how we output data (as a bonus, this also served us aesthetically with…

via TrustedSec Blog (author: Brandon McGrath)
VMware ESXi Forensic with Velociraptor
#synacktiv

via Synacktiv Blog (author: Nathanael Ndong)
Elevating Privileges with Azure Site Recovery Services
#netspi

Discover how NetSPI uncovered and reported a Microsoft-managed Azure Site Recovery service vulnerability and how the finding was remediated.

via NetSPI Technical Blog (author: Joshua Murrell)
And prepare using this materials. 🙂
Forwarded from Red Team Manager
Вопрос собесов - один из самых популярных. Что надо знать, как собесят и как собесить - постарался кратко рассказать в своем посте.

https://teletype.in/@redteammanager/C-SNExDWeez
1
SSHishing – Abusing Shortcut Files and the Windows SSH Client for Initial Access
#redsiege

By: Alex Reid, Current Red Siege Intern   In the April 2018 release of Windows 10 version 1803, Microsoft announced that the Windows OpenSSH client would ship and be enabled […]

via RedSiege Blog (author: Red Siege)
👍1
Evilginx 3.3 - Go & Phish
#kgretzky

Evilginx 3.3 update is here and it comes packing with the special feature everyone has been waiting for.

via BREAKDEV Blog (author: Kuba Gretzky)
👍1
Observations From Business Email Compromise (BEC) Attacks
#trustedsec

Since joining TrustedSec, I have gotten to work numerous cases, and each of them is like unraveling a mystery to get at the truth—especially the situations that have involved business email compromise (or BEC).…

via TrustedSec Blog (author: Thomas Millar)
A Hitch-Hacker's Guide To DACL-Based Detections - The Addendum
#trustedsec

Last year, Andrew and I posted a four (4) part blog series covering various Active Directory (AD) attributes and how…

via TrustedSec Blog (author: Megan Nilsen)
Using Microsoft Dev Tunnels for C2 Redirection
#redsiege

by Justin Palk, Senior Security Consultant   As penetration testers, we’re always on the lookout for new ways to get our command-and-control (C2) traffic out of a client’s network, evading […]

via RedSiege Blog (author: Justin Connors)
Ransomware during a Pentest, Yes or No?
#bcsecurity

NOTE: Some of the topics in this article are probably going to be a bit contentious, but part of the hope in publishing this article is to drive some additional discussion within the offensive security community Ransomware has become one of the most prevalent threats that companies face today. It [...]

via BC Security Blog (author: Hubbl3)
PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 1
#trustedsec

Vulnerability IdentificationPCI DSS version 4.0 requirement 6.3.1, for identification and management of vulnerabilities, and its predecessors in previous versions of PCI DSS have long been misunderstood. This…

via TrustedSec Blog (author: Chris Camejo)
Introducing Delta Encoder
#redsiege

Recently, our own Mike Saunders released a novel shellcode obfuscation technique with the tool Jigsaw. If you haven’t checked out the GitHub repository or his blog post, I highly recommend […]

via RedSiege Blog (author: Justin Connors)
Exploiting American Conquest
#synacktiv

via Synacktiv Blog (author: Webmaster)