RedTeam feed
462 subscribers
67 photos
3 videos
1 file
1K links
RedTeam blogposts and articles collection
Download Telegram
And prepare using this materials. 🙂
Forwarded from Red Team Manager
Вопрос собесов - один из самых популярных. Что надо знать, как собесят и как собесить - постарался кратко рассказать в своем посте.

https://teletype.in/@redteammanager/C-SNExDWeez
1
SSHishing – Abusing Shortcut Files and the Windows SSH Client for Initial Access
#redsiege

By: Alex Reid, Current Red Siege Intern   In the April 2018 release of Windows 10 version 1803, Microsoft announced that the Windows OpenSSH client would ship and be enabled […]

via RedSiege Blog (author: Red Siege)
👍1
Evilginx 3.3 - Go & Phish
#kgretzky

Evilginx 3.3 update is here and it comes packing with the special feature everyone has been waiting for.

via BREAKDEV Blog (author: Kuba Gretzky)
👍1
Observations From Business Email Compromise (BEC) Attacks
#trustedsec

Since joining TrustedSec, I have gotten to work numerous cases, and each of them is like unraveling a mystery to get at the truth—especially the situations that have involved business email compromise (or BEC).…

via TrustedSec Blog (author: Thomas Millar)
A Hitch-Hacker's Guide To DACL-Based Detections - The Addendum
#trustedsec

Last year, Andrew and I posted a four (4) part blog series covering various Active Directory (AD) attributes and how…

via TrustedSec Blog (author: Megan Nilsen)
Using Microsoft Dev Tunnels for C2 Redirection
#redsiege

by Justin Palk, Senior Security Consultant   As penetration testers, we’re always on the lookout for new ways to get our command-and-control (C2) traffic out of a client’s network, evading […]

via RedSiege Blog (author: Justin Connors)
Ransomware during a Pentest, Yes or No?
#bcsecurity

NOTE: Some of the topics in this article are probably going to be a bit contentious, but part of the hope in publishing this article is to drive some additional discussion within the offensive security community Ransomware has become one of the most prevalent threats that companies face today. It [...]

via BC Security Blog (author: Hubbl3)
PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 1
#trustedsec

Vulnerability IdentificationPCI DSS version 4.0 requirement 6.3.1, for identification and management of vulnerabilities, and its predecessors in previous versions of PCI DSS have long been misunderstood. This…

via TrustedSec Blog (author: Chris Camejo)
Introducing Delta Encoder
#redsiege

Recently, our own Mike Saunders released a novel shellcode obfuscation technique with the tool Jigsaw. If you haven’t checked out the GitHub repository or his blog post, I highly recommend […]

via RedSiege Blog (author: Justin Connors)
Exploiting American Conquest
#synacktiv

via Synacktiv Blog (author: Webmaster)
PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 2
#trustedsec

Risk RankingThis is part two (2) of a three (3) part series on PCI DSS version 4.0 requirement 6.3.1, for identification and management of vulnerabilities. This requirement is one (1) of the most misunderstood PCI DSS…

via TrustedSec Blog (author: Chris Camejo)
Flaw in PuTTY P-521 ECDSA signature generation leaks SSH private keys
#nettitude

CVE-2024-31497 is a vulnerability in PuTTY, a popular Windows SSH client, relating to a flaw in its P-521 ECDSA implementation. This vulnerability is known to affect versions 0.68 through 0.80, which span the last 7 years. This potentially affects anyone who has used a P-521 ECDSA SSH key with an affected version, regardless of whether [...]

via Nettitude Labs Blog (author: Graham Sutherland)
Entra ID Banned Password Lists: password spraying optimizations and defenses
#synacktiv

via Synacktiv Blog (author: Matthieu Barjole)
Introducing DAST scanning in the Cloud, with Burp Suite Enterprise Edition
#portswigger

We’re excited to announce that Burp Suite Enterprise Edition is now available in PortSwigger’s secure cloud. You can now free up testing time with scalable, automated DAST scanning, without the burden

via PortSwigger Blog
Introducing the MLCommons AI Safety v0.5 Proof of Concept
#nettitude

Artificial Intelligence (AI) has been making significant strides in recent years, with advancements in machine learning and deep learning techniques. However, as AI systems become more complex and powerful, ensuring their safety becomes increasingly critical. In a ground-breaking move towards enhancing AI safety, MLCommons, an open collaboration-focused Artificial Intelligence engineering consortium, has unveiled the MLCommons [...]

via Nettitude Labs Blog (author: Dave Parsons)