This media is not supported in your browser
VIEW IN TELEGRAM
Caster will release his article βPhilosophy of Nietzscheβ on December 20
π₯7π4β€2π₯±2π€£1
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org
An extremely specific method of pivoting on Windows using Nebula.
https://blog.exploit.org/caster-philosophy-of-nietzsche
An extremely specific method of pivoting on Windows using Nebula.
https://blog.exploit.org/caster-philosophy-of-nietzsche
π₯5π3π3β€βπ₯2π΄1
exploit.org
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org An extremely specific method of pivoting on Windows using Nebula. https://blog.exploit.org/caster-philosophy-of-nietzsche
Inspired by Friedrich Nietzsche's "Thus Spoke Zarathustra", Caster continues his experiments with Nebula. He has greatly increased the complexity of the network architecture while adapting his experimental concept from βPhilosophy of Nietzscheβ to it.
New release coming soon.
New release coming soon.
π₯7π4π2π2π΄1
Caster's new release on pivoting on Windows using Nebula in the presence of NAT.
Release Date: 30 December 2024
https://blog.exploit.org/caster-ubermensch/
Release Date: 30 December 2024
https://blog.exploit.org/caster-ubermensch/
π6π2β€1π₯1π1
Caster returns with the release of the βSeen It Allβ video
Taking off his red mask and putting on his blue mask, he performed an in-depth packet analysis and demonstrated Suricata IDS signatures to detect attacks on Active Directory.
https://www.youtube.com/watch?v=LvsBC9dGpWg
Taking off his red mask and putting on his blue mask, he performed an in-depth packet analysis and demonstrated Suricata IDS signatures to detect attacks on Active Directory.
https://www.youtube.com/watch?v=LvsBC9dGpWg
YouTube
Seen It All: Detecting Active Directory Attacks with Suricata IDS [English Subtitles]
A research study on detecting attacks on Windows networks based on traffic analysis. Especially for Blue Team engineers and Windows administrators.
Gist flie with signatures: https://gist.github.com/casterbyte/b0370faab8c3d0061dd3eb6c1c8ef3df
Github link:β¦
Gist flie with signatures: https://gist.github.com/casterbyte/b0370faab8c3d0061dd3eb6c1c8ef3df
Github link:β¦
π₯6β€3π3π2π1
Caster returns with the release of a crazy article about attacks on IPv6. Welcome back!
https://blog.exploit.org/caster-legless
https://blog.exploit.org/caster-legless
π₯6π2β€1π€¨1π1
Caster presents its new tool: Ibex
This is a new toolkit for conducting attacks on IPv6 networks.
Features of Ibex:
RA & RDNSS spoofing (no DHCPv6 required)
RA Guard evasion via HBH fragmentation
Full NAT64 & DNS64 automation
CLI with autocomplete and modular shells
Automatic system and routing tuning
NDP traffic analysis for reconnaissance
Killswitch for safe termination and recovery
https://github.com/casterbyte/Ibex
This is a new toolkit for conducting attacks on IPv6 networks.
Features of Ibex:
RA & RDNSS spoofing (no DHCPv6 required)
RA Guard evasion via HBH fragmentation
Full NAT64 & DNS64 automation
CLI with autocomplete and modular shells
Automatic system and routing tuning
NDP traffic analysis for reconnaissance
Killswitch for safe termination and recovery
https://github.com/casterbyte/Ibex
π₯2β€1π1