Introducing STAR-FS
#mdsec
March, 2024 Last week, the Bank of England announced the introduction of a new regulatory framework, STAR-FS, to support the financial sector in its cyber resilience operations. Over 4 years...
via MDSec Blog (author: Admin)
#mdsec
March, 2024 Last week, the Bank of England announced the introduction of a new regulatory framework, STAR-FS, to support the financial sector in its cyber resilience operations. Over 4 years...
via MDSec Blog (author: Admin)
How Just-Metadata Reinvents IP Analysis
#redsiege
Tool developed by: Chris Truncer Cracking the Code with Just-Metadata Imagine trying to solve a giant puzzle where each piece is hidden in a massive digital world. That’s what dealing […]
via RedSiege Blog (author: Red Siege)
#redsiege
Tool developed by: Chris Truncer Cracking the Code with Just-Metadata Imagine trying to solve a giant puzzle where each piece is hidden in a massive digital world. That’s what dealing […]
via RedSiege Blog (author: Red Siege)
Navigating Active Directory Security with EDD
#redsiege
Tool developed by: Chris Truncer Leverage EDD for Advanced Offensive Strategies EDD serves as a critical tool for offensive security professionals, enhancing domain reconnaissance with .NET efficiency. It facilitates a […]
via RedSiege Blog (author: Red Siege)
#redsiege
Tool developed by: Chris Truncer Leverage EDD for Advanced Offensive Strategies EDD serves as a critical tool for offensive security professionals, enhancing domain reconnaissance with .NET efficiency. It facilitates a […]
via RedSiege Blog (author: Red Siege)
From Chaos to Clarity: Organizing Data With Structured Formats
#trustedsec
About a year ago, we introduced a logging utility into our internal tooling on the Targeted Operations team to standardize how we output data (as a bonus, this also served us aesthetically with…
via TrustedSec Blog (author: Brandon McGrath)
#trustedsec
About a year ago, we introduced a logging utility into our internal tooling on the Targeted Operations team to standardize how we output data (as a bonus, this also served us aesthetically with…
via TrustedSec Blog (author: Brandon McGrath)
Elevating Privileges with Azure Site Recovery Services
#netspi
Discover how NetSPI uncovered and reported a Microsoft-managed Azure Site Recovery service vulnerability and how the finding was remediated.
via NetSPI Technical Blog (author: Joshua Murrell)
#netspi
Discover how NetSPI uncovered and reported a Microsoft-managed Azure Site Recovery service vulnerability and how the finding was remediated.
via NetSPI Technical Blog (author: Joshua Murrell)
Forwarded from Red Team Manager
Вопрос собесов - один из самых популярных. Что надо знать, как собесят и как собесить - постарался кратко рассказать в своем посте.
https://teletype.in/@redteammanager/C-SNExDWeez
https://teletype.in/@redteammanager/C-SNExDWeez
Teletype
Собесы в пентест
Пора разобрать самую популярную тему, связанную с менеджментом, а именно - собесы. Собеседование кандидата является очень стрессовым...
❤1
Forwarded from vx-underground
Happy Supply Chain Attack Friday!
tldr if you updated Kali Linux recently you're pwned with malware
https://twitter.com/kalilinux/status/1773786266074513523
tldr if you updated Kali Linux recently you're pwned with malware
https://twitter.com/kalilinux/status/1773786266074513523
X (formerly Twitter)
Kali Linux (@kalilinux) on X
The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the…
SSHishing – Abusing Shortcut Files and the Windows SSH Client for Initial Access
#redsiege
By: Alex Reid, Current Red Siege Intern In the April 2018 release of Windows 10 version 1803, Microsoft announced that the Windows OpenSSH client would ship and be enabled […]
via RedSiege Blog (author: Red Siege)
#redsiege
By: Alex Reid, Current Red Siege Intern In the April 2018 release of Windows 10 version 1803, Microsoft announced that the Windows OpenSSH client would ship and be enabled […]
via RedSiege Blog (author: Red Siege)
👍1
Evilginx 3.3 - Go & Phish
#kgretzky
Evilginx 3.3 update is here and it comes packing with the special feature everyone has been waiting for.
via BREAKDEV Blog (author: Kuba Gretzky)
#kgretzky
Evilginx 3.3 update is here and it comes packing with the special feature everyone has been waiting for.
via BREAKDEV Blog (author: Kuba Gretzky)
👍1
Getting Intune with Bugs and Tokens: A Journey Through EPM
#specterops
via SpecterOps Team Medium (author: Zach Stein)
#specterops
via SpecterOps Team Medium (author: Zach Stein)
Medium
Getting Intune with Bugs and Tokens: A Journey Through EPM
Written by Zach Stein & Duane Michael
Observations From Business Email Compromise (BEC) Attacks
#trustedsec
Since joining TrustedSec, I have gotten to work numerous cases, and each of them is like unraveling a mystery to get at the truth—especially the situations that have involved business email compromise (or BEC).…
via TrustedSec Blog (author: Thomas Millar)
#trustedsec
Since joining TrustedSec, I have gotten to work numerous cases, and each of them is like unraveling a mystery to get at the truth—especially the situations that have involved business email compromise (or BEC).…
via TrustedSec Blog (author: Thomas Millar)
Ghostwriter v4.1: The Custom Fields Update
#specterops
via SpecterOps Team Medium (author: Christopher Maddalena)
#specterops
via SpecterOps Team Medium (author: Christopher Maddalena)
Medium
Ghostwriter v4.1: The Custom Fields Update
Introducing the awesome changes in the latest Ghostwriter
❤1
A Hitch-Hacker's Guide To DACL-Based Detections - The Addendum
#trustedsec
Last year, Andrew and I posted a four (4) part blog series covering various Active Directory (AD) attributes and how…
via TrustedSec Blog (author: Megan Nilsen)
#trustedsec
Last year, Andrew and I posted a four (4) part blog series covering various Active Directory (AD) attributes and how…
via TrustedSec Blog (author: Megan Nilsen)
Using Microsoft Dev Tunnels for C2 Redirection
#redsiege
by Justin Palk, Senior Security Consultant As penetration testers, we’re always on the lookout for new ways to get our command-and-control (C2) traffic out of a client’s network, evading […]
via RedSiege Blog (author: Justin Connors)
#redsiege
by Justin Palk, Senior Security Consultant As penetration testers, we’re always on the lookout for new ways to get our command-and-control (C2) traffic out of a client’s network, evading […]
via RedSiege Blog (author: Justin Connors)
Ransomware during a Pentest, Yes or No?
#bcsecurity
NOTE: Some of the topics in this article are probably going to be a bit contentious, but part of the hope in publishing this article is to drive some additional discussion within the offensive security community Ransomware has become one of the most prevalent threats that companies face today. It [...]
via BC Security Blog (author: Hubbl3)
#bcsecurity
NOTE: Some of the topics in this article are probably going to be a bit contentious, but part of the hope in publishing this article is to drive some additional discussion within the offensive security community Ransomware has become one of the most prevalent threats that companies face today. It [...]
via BC Security Blog (author: Hubbl3)
PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 1
#trustedsec
Vulnerability IdentificationPCI DSS version 4.0 requirement 6.3.1, for identification and management of vulnerabilities, and its predecessors in previous versions of PCI DSS have long been misunderstood. This…
via TrustedSec Blog (author: Chris Camejo)
#trustedsec
Vulnerability IdentificationPCI DSS version 4.0 requirement 6.3.1, for identification and management of vulnerabilities, and its predecessors in previous versions of PCI DSS have long been misunderstood. This…
via TrustedSec Blog (author: Chris Camejo)
Rooting out Risky SCCM Configs with Misconfiguration Manager
#specterops
via SpecterOps Team Medium (author: Chris Thompson)
#specterops
via SpecterOps Team Medium (author: Chris Thompson)
Medium
Rooting out Risky SCCM Configs with Misconfiguration Manager
tl;dr: I wrote a script to identify every TAKEOVER and ELEVATE attack in Misconfiguration Manager.
Introducing Delta Encoder
#redsiege
Recently, our own Mike Saunders released a novel shellcode obfuscation technique with the tool Jigsaw. If you haven’t checked out the GitHub repository or his blog post, I highly recommend […]
via RedSiege Blog (author: Justin Connors)
#redsiege
Recently, our own Mike Saunders released a novel shellcode obfuscation technique with the tool Jigsaw. If you haven’t checked out the GitHub repository or his blog post, I highly recommend […]
via RedSiege Blog (author: Justin Connors)