Red Team Tactics: Advanced process monitoring techniques in offensive operations
https://outflank.nl/blog/2020/03/11/red-team-tactics-advanced-process-monitoring-techniques-in-offensive-operations/
https://outflank.nl/blog/2020/03/11/red-team-tactics-advanced-process-monitoring-techniques-in-offensive-operations/
Outflank
Red Team Tactics: Advanced process monitoring techniques in offensive operations | Outflank
In this blog post we are going to explore the power of well-known process monitoring utilities and demonstrate how the technology behind these tools can be used by Red Teams within offensive operations. Having a good technical understanding of the systemsβ¦
Lessons learned on written social engineering attacks
https://diablohorn.com/2020/03/04/lessons-learned-on-written-social-engineering-attacks/
If you find information in this channel is useful, please consider to share this channel https://t.me/petruk_feed
https://diablohorn.com/2020/03/04/lessons-learned-on-written-social-engineering-attacks/
If you find information in this channel is useful, please consider to share this channel https://t.me/petruk_feed
DiabloHorn
Lessons learned on written social engineering attacks
Iβve had some interesting conversations on the topic of performing social engineering attacks via email and decided to share some of my past lessons learned. The focus will not be so much on β¦
Leveraging AWS for Incident Response: Part 1
https://medium.com/faun/leveraging-aws-for-incident-response-part-1-2963bb31bc05
βββββββββββββββββββββ-
If you find information in this channel is useful, please consider to share this channel https://t.me/petruk_feed
https://medium.com/faun/leveraging-aws-for-incident-response-part-1-2963bb31bc05
βββββββββββββββββββββ-
If you find information in this channel is useful, please consider to share this channel https://t.me/petruk_feed
Medium
Leveraging AWS for Incident Response: Part 1
When an incident occurs, time is everything. One significant challenge Iβve experience performing incident response is working with theβ¦
Password Spraying & Other Fun with RPCCLIENT
https://www.blackhillsinfosec.com/password-spraying-other-fun-with-rpcclient/
https://www.blackhillsinfosec.com/password-spraying-other-fun-with-rpcclient/
Black Hills Information Security
Password Spraying & Other Fun with RPCCLIENT - Black Hills Information Security
Joff Thyer // Many of us in the penetration testing community arβe used to scenarios whereby we land a targeted phishing campaign within a Windows enterprise environment and have [β¦]
Kerberoasting: AES Encryption, Protected User Group and Group MSA
https://dev-2null.github.io/Kerberoasting-AES-Encryption-Protected-Users-Group-and-gMSA/
https://dev-2null.github.io/Kerberoasting-AES-Encryption-Protected-Users-Group-and-gMSA/
dev-2null.github.io
Kerberoasting: AES Encryption, Protected User Group and Group MSA
Introduction
What is your favourite topic?
Anonymous Poll
26%
Active Directory
45%
Reverse Engineering
48%
Exploit Development
29%
OSINT
12%
PowerShell
If you have any suggestions, please don't hesitate to contact me at @petruknisme
Leveraging AWS for Incident Response: Part 2
https://medium.com/faun/leveraging-aws-for-incident-response-part-2-bac66bfaf1a1
βββββββββββββββββββββ-
If you find information in this channel is useful, please consider to share this channel https://t.me/petruk_feed
https://medium.com/faun/leveraging-aws-for-incident-response-part-2-bac66bfaf1a1
βββββββββββββββββββββ-
If you find information in this channel is useful, please consider to share this channel https://t.me/petruk_feed
Medium
Leveraging AWS for Incident Response: Part 2
In my previous post (https://medium.com/@tstillz17/leveraging-aws-for-incident-response-part-1-2963bb31bc05) we covered how AWS resourcesβ¦
Stanford Web Security Course
https://web.stanford.edu/class/cs253/
https://web.stanford.edu/class/cs253/
web.stanford.edu
CS253 - Web Security
Principles of web security. The fundamentals and state-of-the-art in web security. Attacks and countermeasures. Topics include: the browser security model, web app vulnerabilities, injection, denial-of-service, TLS attacks, privacy, fingerprinting, same-originβ¦
Salah satu anggota di komunitas lagi dapat ujian dari Tuhan, anak tersayangnya terkena meningitis-TB dan sekarang membutuhkan biaya untuk operasi kurang lebih 50juta.
Saya berharap kemurahan hati bagi yang membaca postingan ini, dipersilakan untuk membantu materi ataupun hanya doa terbaik.
Untuk penggalangan dana secara terkoordinir bisa ke beberapa rekening berikut:
Jenius cashtag: $petruknisme
BCA: PM saya pribadi untuk norek @petruknisme
Uang akan disumbangkan minggu ini.
https://kitabisa.com/campaign/banturenjana
Terima kasih sudah meluangkan waktunya untuk membaca pesan ini, sehat selalu, semoga Tuhan mengasihi.
Saya berharap kemurahan hati bagi yang membaca postingan ini, dipersilakan untuk membantu materi ataupun hanya doa terbaik.
Untuk penggalangan dana secara terkoordinir bisa ke beberapa rekening berikut:
Jenius cashtag: $petruknisme
BCA: PM saya pribadi untuk norek @petruknisme
Uang akan disumbangkan minggu ini.
https://kitabisa.com/campaign/banturenjana
Terima kasih sudah meluangkan waktunya untuk membaca pesan ini, sehat selalu, semoga Tuhan mengasihi.
Kitabisa.com
Bantu adik Renjana pulih dari sakitnya
Mohon bantuan doa dan donasinya untuk kesembuhan buah hati kami, Renjana
Petruknisme's Feed pinned Β«Salah satu anggota di komunitas lagi dapat ujian dari Tuhan, anak tersayangnya terkena meningitis-TB dan sekarang membutuhkan biaya untuk operasi kurang lebih 50juta. Saya berharap kemurahan hati bagi yang membaca postingan ini, dipersilakan untuk membantuβ¦Β»
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
https://github.com/OWASP/IoTGoat
https://github.com/OWASP/IoTGoat
GitHub
GitHub - OWASP/IoTGoat: IoTGoat is a deliberately insecure firmware created to educate software developers and security professionalsβ¦
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices. - OWASP/IoTGoat
Red Teamerβs Cookbook: BYOI (Bring Your Own Interpreter)
https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/
https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/
Black Hills Information Security
Red Teamer's Cookbook: BYOI (Bring Your Own Interpreter) - Black Hills Information Security
Marcello Salvati // This fairly lengthy blog post aims at providing Red Team Operators ideas on how to incorporate BYOI tradecraft into their own custom tooling and get those creative [β¦]