Forwarded from Exploiting Crew (Pr1vAt3)
π¦π
πππ πππππππππ - πππ ππππ
Pentesting is primarily concerned with identifying and exploiting vulnerabilities within a specific target system, striving to uncover as many weaknesses as possible.
This process aids in shoring up an organization's defenses by pinpointing areas of vulnerability.
On the other hand, a red team engagement shifts its focus. Instead of merely finding vulnerabilities, it aims to assess an organization's defensive capabilities by simulating real-world attacks.
The goal is to evaluate how well the organization can detect and respond to these simulated threat actors.
You will find below a list of resources for Red Teaming.
ππͺπππ§ ππ¦ π₯ππ π§πππ ?
πRed Team definition, redteam guide by Joe Vest & James Tubberville
https://lnkd.in/eUaZcWvg
πRed Teaming Handbook, UK Ministry of Defense
https://lnkd.in/euUkwQRq
ππͺπππ§ ππ₯π π₯ππ π§πππ ππ«ππ₯πππ¦ππ¦?
πNISTβs Definition of Red Team Exercise
https://lnkd.in/eZVzn5AW
πRed Team Plan by Magoo
https://lnkd.in/eFUBzxEY
ππ§ππππ‘ππ€π¨ππ¦ ππ‘π π ππ§ππ’ππ’ππ’ππππ¦
πMITRE ATT&CK Matrix for Enterprise
https://attack.mitre.org/
πRed Team Guides by Joe Vest & James Tubberville
https://lnkd.in/eXPxchUk
πRed Team Operations Part 1 and 2 Joas A Santos
https://lnkd.in/e7m3XzE7
https://lnkd.in/es7uSQA4
πRed Team Notes 2.0 by dmcxblue
https://lnkd.in/ekGaQASx
πππ’π¨π₯π¦ππ¦ ππ‘π πππ‘ππ¦ π’π‘
πHackersploit Red Team Series (video and guide)
https://lnkd.in/ek5naA4Q
https://lnkd.in/e4U2tW2z
πResponsible Red Teaming by The Taggart Institute
https://lnkd.in/eur4_nFn
πRed Teaming rooms on TryHackMe
https://lnkd.in/e8G9eMS5
https://lnkd.in/eYa9mHmk
https://lnkd.in/eQcnuu-m
πBoard games by Hadess | ΨΨ§Ψ―Ψ«
https://lnkd.in/ee2EEyEh
ππ§π’π’ππ¦
πRed Teaming Toolkit by infosecn1nja
https://lnkd.in/e8VnsYVH
πRed Team tools by A-poc
https://lnkd.in/evPBDZRm
πRed Teaming Toolkit Collection by 0xsp
https://lnkd.in/eP7jNUE4
πRed Team Ops Cobalt
https://lnkd.in/euMjeFEx
πππ’π‘π¨π¦
πRed Team Resources by J0hnBx
https://lnkd.in/eeYCQ-Db
πRed Team Village talks
https://lnkd.in/eHwKj5gB
πA Beginner's Guide to Obfuscation by BC Security
https://lnkd.in/e92JuwPR
Full credit: Gabrielle B.
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Pentesting is primarily concerned with identifying and exploiting vulnerabilities within a specific target system, striving to uncover as many weaknesses as possible.
This process aids in shoring up an organization's defenses by pinpointing areas of vulnerability.
On the other hand, a red team engagement shifts its focus. Instead of merely finding vulnerabilities, it aims to assess an organization's defensive capabilities by simulating real-world attacks.
The goal is to evaluate how well the organization can detect and respond to these simulated threat actors.
You will find below a list of resources for Red Teaming.
ππͺπππ§ ππ¦ π₯ππ π§πππ ?
πRed Team definition, redteam guide by Joe Vest & James Tubberville
https://lnkd.in/eUaZcWvg
πRed Teaming Handbook, UK Ministry of Defense
https://lnkd.in/euUkwQRq
ππͺπππ§ ππ₯π π₯ππ π§πππ ππ«ππ₯πππ¦ππ¦?
πNISTβs Definition of Red Team Exercise
https://lnkd.in/eZVzn5AW
πRed Team Plan by Magoo
https://lnkd.in/eFUBzxEY
ππ§ππππ‘ππ€π¨ππ¦ ππ‘π π ππ§ππ’ππ’ππ’ππππ¦
πMITRE ATT&CK Matrix for Enterprise
https://attack.mitre.org/
πRed Team Guides by Joe Vest & James Tubberville
https://lnkd.in/eXPxchUk
πRed Team Operations Part 1 and 2 Joas A Santos
https://lnkd.in/e7m3XzE7
https://lnkd.in/es7uSQA4
πRed Team Notes 2.0 by dmcxblue
https://lnkd.in/ekGaQASx
πππ’π¨π₯π¦ππ¦ ππ‘π πππ‘ππ¦ π’π‘
πHackersploit Red Team Series (video and guide)
https://lnkd.in/ek5naA4Q
https://lnkd.in/e4U2tW2z
πResponsible Red Teaming by The Taggart Institute
https://lnkd.in/eur4_nFn
πRed Teaming rooms on TryHackMe
https://lnkd.in/e8G9eMS5
https://lnkd.in/eYa9mHmk
https://lnkd.in/eQcnuu-m
πBoard games by Hadess | ΨΨ§Ψ―Ψ«
https://lnkd.in/ee2EEyEh
ππ§π’π’ππ¦
πRed Teaming Toolkit by infosecn1nja
https://lnkd.in/e8VnsYVH
πRed Team tools by A-poc
https://lnkd.in/evPBDZRm
πRed Teaming Toolkit Collection by 0xsp
https://lnkd.in/eP7jNUE4
πRed Team Ops Cobalt
https://lnkd.in/euMjeFEx
πππ’π‘π¨π¦
πRed Team Resources by J0hnBx
https://lnkd.in/eeYCQ-Db
πRed Team Village talks
https://lnkd.in/eHwKj5gB
πA Beginner's Guide to Obfuscation by BC Security
https://lnkd.in/e92JuwPR
Full credit: Gabrielle B.
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π± A Royal Encounter with #AI: King Charles III Amazed by #Apple's Image Wand
https://undercodenews.com/a-royal-encounter-with-ai-king-charles-iii-amazed-by-apples-image-wand/
@Undercode_News
https://undercodenews.com/a-royal-encounter-with-ai-king-charles-iii-amazed-by-apples-image-wand/
@Undercode_News
UNDERCODE NEWS
A Royal Encounter with AI: King Charles III Amazed by Apple's Image Wand - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π± #Apple's #AI-Powered Notifications Under Fire for False Reports
https://undercodenews.com/apples-ai-powered-notifications-under-fire-for-false-reports/
@Undercode_News
https://undercodenews.com/apples-ai-powered-notifications-under-fire-for-false-reports/
@Undercode_News
UNDERCODE NEWS
Apple's AI-Powered Notifications Under Fire for False Reports - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π The Myth of #AI Emotion Recognition: Science or Sales Pitch?
https://undercodenews.com/the-myth-of-ai-emotion-recognition-science-or-sales-pitch/
@Undercode_News
https://undercodenews.com/the-myth-of-ai-emotion-recognition-science-or-sales-pitch/
@Undercode_News
UNDERCODE NEWS
The Myth of AI Emotion Recognition: Science or Sales Pitch? - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Sharp & Carter CEO Sparks Controversy with Blunt Christmas Speech
https://undercodenews.com/sharp-carter-ceo-sparks-controversy-with-blunt-christmas-speech/
@Undercode_News
https://undercodenews.com/sharp-carter-ceo-sparks-controversy-with-blunt-christmas-speech/
@Undercode_News
UNDERCODE NEWS
Sharp & Carter CEO Sparks Controversy with Blunt Christmas Speech - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
π¦ Cybersecurity 101 in one picture
1. Introduction to Cybersecurity
2. The CIA Triad
3. Common Cybersecurity Threats
4. Basic Defense Mechanisms
5. Cybersecurity Frameworks
6. Cybersecurity Ecosystem
1. Introduction to Cybersecurity
2. The CIA Triad
3. Common Cybersecurity Threats
4. Basic Defense Mechanisms
5. Cybersecurity Frameworks
6. Cybersecurity Ecosystem
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Thriving Through Challenges: The Nigerian Startup Landscape
https://undercodenews.com/thriving-through-challenges-the-nigerian-startup-landscape/
@Undercode_News
https://undercodenews.com/thriving-through-challenges-the-nigerian-startup-landscape/
@Undercode_News
UNDERCODE NEWS
Thriving Through Challenges: The Nigerian Startup Landscape - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Bridging the Gap: MTN Joins the Race for Satellite Internet in Africa
https://undercodenews.com/bridging-the-gap-mtn-joins-the-race-for-satellite-internet-in-africa/
@Undercode_News
https://undercodenews.com/bridging-the-gap-mtn-joins-the-race-for-satellite-internet-in-africa/
@Undercode_News
UNDERCODE NEWS
Bridging the Gap: MTN Joins the Race for Satellite Internet in Africa - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π₯οΈ Unmasking the Puppet Master: ProxyAM and the Socks5Systemz Botnet
https://undercodenews.com/unmasking-the-puppet-master-proxyam-and-the-socks5systemz-botnet/
@Undercode_News
https://undercodenews.com/unmasking-the-puppet-master-proxyam-and-the-socks5systemz-botnet/
@Undercode_News
UNDERCODE NEWS
Unmasking the Puppet Master: ProxyAM and the Socks5Systemz Botnet - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π§ Artificial Intelligence: A Double-Edged Sword
https://undercodenews.com/artificial-intelligence-a-double-edged-sword/
@Undercode_News
https://undercodenews.com/artificial-intelligence-a-double-edged-sword/
@Undercode_News
UNDERCODE NEWS
Artificial Intelligence: A Double-Edged Sword - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
π¦ARP and DNS Spoofing:
> Network Penetration Testing: Assess the security of networks by identifying weaknesses in ARP protocols and DNS resolutions. ππ‘
>Security Auditing: Log and analyze network traffic to discover potential vulnerabilities and improve network defenses. ππ
> Educational Purposes: Learn and teach network security concepts through practical, hands-on experience with ARP and DNS spoofing techniques. ππ
>Traffic Analysis: Monitor and capture traffic for forensic investigations or to understand user behavior on a network. ππ
Installation π
To install and run BlackVenom, follow these simple steps:
1οΈβ£ Create a Python Virtual Environment π
First, create a virtual environment to manage dependencies:
2οΈβ£ Activate the Virtual Environment π
Activate the virtual environment:
source BlackVenom-Kali/bin/activate
3οΈβ£ Install Dependencies π¦
Now, install the necessary dependencies from the requirements.txt file:
> Run the Tool β‘οΈ After installation, you can run BlackVenom using the provided CLI:
python black_venom_cli.py
Usage Examples
Example 1: Basic ARP Spoofing
This command performs a basic ARP spoofing attack between a target and a gateway without enabling packet logging or DNS spoofing. π
Example 2: ARP Spoofing with Traffic Logging
In this example, packet logging is enabled while performing ARP spoofing. π
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
> Network Penetration Testing: Assess the security of networks by identifying weaknesses in ARP protocols and DNS resolutions. ππ‘
>Security Auditing: Log and analyze network traffic to discover potential vulnerabilities and improve network defenses. ππ
> Educational Purposes: Learn and teach network security concepts through practical, hands-on experience with ARP and DNS spoofing techniques. ππ
>Traffic Analysis: Monitor and capture traffic for forensic investigations or to understand user behavior on a network. ππ
Installation π
To install and run BlackVenom, follow these simple steps:
1οΈβ£ Create a Python Virtual Environment π
First, create a virtual environment to manage dependencies:
python -m venv BlackVenom-Kali
2οΈβ£ Activate the Virtual Environment π
Activate the virtual environment:
source BlackVenom-Kali/bin/activate
3οΈβ£ Install Dependencies π¦
Now, install the necessary dependencies from the requirements.txt file:
pip install -r requirements.txt
> Run the Tool β‘οΈ After installation, you can run BlackVenom using the provided CLI:
python black_venom_cli.py
Usage Examples
Example 1: Basic ARP Spoofing
This command performs a basic ARP spoofing attack between a target and a gateway without enabling packet logging or DNS spoofing. π
sudo python black_venom_cli.py \
--target_ip 192.168.11.128 \
--gateway_ip 192.168.11.2 \
--interface eth0
Example 2: ARP Spoofing with Traffic Logging
In this example, packet logging is enabled while performing ARP spoofing. π
sudo python black_venom_cli.py \
--target_ip 192.168.11.128 \
--gateway_ip 192.168.11.2 \
--interface eth0 \
--enable_logging \
--log_file ~/Desktop/captured_packets.pcap
Example 3: ARP Spoofing and DNS Spoofing
This command enables both ARP spoofing and DNS spoofing, redirecting DNS requests for a specific domain. ππ
sudo python black_venom_cli.py \
--target_ip 192.168.11.128 \
--gateway_ip 192.168.11.2 \
--interface eth0 \
--enable_logging \
--log_file ~/Desktop/captured_packets.pcap
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Hackers Leak Private Photos of WWE Star Paige
https://undercodenews.com/hackers-leak-private-photos-of-wwe-star-paige/
@Undercode_News
https://undercodenews.com/hackers-leak-private-photos-of-wwe-star-paige/
@Undercode_News
UNDERCODE NEWS
Hackers Leak Private Photos of WWE Star Paige - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Pakistan's #Digital Pulse: Top #Google Searches of 2024
https://undercodenews.com/pakistans-digital-pulse-top-google-searches-of-2024/
@Undercode_News
https://undercodenews.com/pakistans-digital-pulse-top-google-searches-of-2024/
@Undercode_News
UNDERCODE NEWS
Pakistan's Digital Pulse: Top Google Searches of 2024 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
π¦Spoofing Utilities:
DNS-Spoof by Mustafa Dalga:
https://github.com/mustafadalga/dns-spoof
MITM Attack Practice:
https://github.com/bilalz5-github/MITM-Attack_practice
ARP Spoof Detection Tool (Dr. Spoof):
https://github.com/Enixes/Dr.Spoof
AdBleed (DNS Redirection Tool):
https://github.com/arevaclier/AdBleed
DNS Packet Injection:
https://github.com/shreyasbhatia09/DNS-Packet-Injection
PyDNS (Python DNS Server):
https://github.com/Douile/pydns
Rock-DDOS (Includes ARP Spoofing):
https://github.com/MasonDye/Rock-DDOS
NetSpionage:
https://github.com/ANG13T/netspionage
Dead Drop (Network Steganography with Spoofing):
https://github.com/kerosene5/Dead_Drop
ATA-Shell (ARP Modular Shell):
https://github.com/shelbenheimer/ata-shell
Phishing with DNS Spoofing Demo:
https://github.com/chi-0828/Phishing-with-DNS-spoofing
RITM (Roast in the Middle for MITM):
https://github.com/Tw1sm/RITM
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
DNS-Spoof by Mustafa Dalga:
https://github.com/mustafadalga/dns-spoof
MITM Attack Practice:
https://github.com/bilalz5-github/MITM-Attack_practice
ARP Spoof Detection Tool (Dr. Spoof):
https://github.com/Enixes/Dr.Spoof
AdBleed (DNS Redirection Tool):
https://github.com/arevaclier/AdBleed
DNS Packet Injection:
https://github.com/shreyasbhatia09/DNS-Packet-Injection
PyDNS (Python DNS Server):
https://github.com/Douile/pydns
Rock-DDOS (Includes ARP Spoofing):
https://github.com/MasonDye/Rock-DDOS
NetSpionage:
https://github.com/ANG13T/netspionage
Dead Drop (Network Steganography with Spoofing):
https://github.com/kerosene5/Dead_Drop
ATA-Shell (ARP Modular Shell):
https://github.com/shelbenheimer/ata-shell
Phishing with DNS Spoofing Demo:
https://github.com/chi-0828/Phishing-with-DNS-spoofing
RITM (Roast in the Middle for MITM):
https://github.com/Tw1sm/RITM
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mustafadalga/dns-spoof: DNS isteklerini veya trafiΔi kendi istediΔiniz yere yΓΆnlendirerek hedef web sitesini manipΓΌleβ¦
DNS isteklerini veya trafiΔi kendi istediΔiniz yere yΓΆnlendirerek hedef web sitesini manipΓΌle etmenize yarayan bir script. - mustafadalga/dns-spoof
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Blackview Hero 10: A Flawed Foldable Attempt
https://undercodenews.com/blackview-hero-10-a-flawed-foldable-attempt/
@Undercode_News
https://undercodenews.com/blackview-hero-10-a-flawed-foldable-attempt/
@Undercode_News
UNDERCODE NEWS
Blackview Hero 10: A Flawed Foldable Attempt - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Don't Fall for the Hype! NITDA Warns of Deceptive Festive Season Scams
https://undercodenews.com/dont-fall-for-the-hype-nitda-warns-of-deceptive-festive-season-scams/
@Undercode_News
https://undercodenews.com/dont-fall-for-the-hype-nitda-warns-of-deceptive-festive-season-scams/
@Undercode_News
UNDERCODE NEWS
Don't Fall for the Hype! NITDA Warns of Deceptive Festive Season Scams - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Israel's #AI Talent Boost: A Strategic Move
https://undercodenews.com/israels-ai-talent-boost-a-strategic-move/
@Undercode_News
https://undercodenews.com/israels-ai-talent-boost-a-strategic-move/
@Undercode_News
UNDERCODE NEWS
Israel's AI Talent Boost: A Strategic Move - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦