#Beacon
1.19K subscribers
272 photos
26 videos
130 files
1.83K links
Прожаренный цуберпохек

[educational channel/white hat only] - do not try the knowledge from here on your home or other people's microwaves
Download Telegram
А тут ультимативный гайд по бурпу, бесплатно
"The Ultimate Guide to Learning Burp Suite for FREE"

Включено в смежных статьях(тож по бурпику):
The Beginner’s Guide to API Hacking
7 Essential Burp Extensions for Hacking APIs
Automate your API hacking with Autorize
A Step-by-Step Guide to Writing Extensions for API Hacking
Improve your API Security Testing with Burp BCheck Scripts

https://danaepp.com/the-ultimate-guide-to-learning-burp-suite-for-free

#Beacon
Автоматизация ручного пентеста,
https://youtu.be/DlTWet7JcKk?si=x6rhW6Bc7oQ3_Sdl

Прикольный спич про баг-баунти, девсекопс и underrated skills во всем этом, а также собственно как автоматизировать ручную работу

#Beacon
Forwarded from SHADOW:Group
🌐 Увеличиваем Attack Surface на пентесте периметра

На пентестах внешнего периметра не всегда сразу доступен полный скоуп IP-адресов, доменов и поддоменов. В таких случаях приходится recon-ить все ресурсы компании самостоятельно. Зачастую компании сами не подозревают, какие ресурсы у них могут «торчать наружу».

Аналогичная ситуация ждет вас и на багбаунти, когда у программы широкий скоуп и грамотная разведка и сбор ресурсов компании может помочь найти вам то, что не нашли другие.

Из статьи ниже вы поймете на практическом примере как производить сбор IP-адресов заказчика, а также проводить горизонтальный и вертикальный поиск доменов.

Читать статью

#web #recon
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from PT SWARM
🚀 We're excited to unveil a new tool developed by our researcher @kiber_io: APKd. Now, you can effortlessly download APKs from AppGallery, APKPure, and RuStore directly from the terminal!

Check it out here: https://github.com/kiber-io/apkd
Pass-the-Challenge: Defeating Windows Defender Credential Guard

https://research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22

Why do we care?
Attackers often attempt to dump credentials from the LSASS process memory on a compromised machine in order to move laterally within the network, using tools like Mimikatz that can extract various credentials, including plaintext passwords, NTLM hashes, and Kerberos tickets.

Credential Guard appears to protect against these types of attacks by isolating NTLM hashes (and Kerberos tickets) in the LSASS process memory, thus protect against the initial compromise of a user’s NTLM hash.

Now, if we compromise a system that has Credential Guard enabled and attempt to extract credentials from the LSASS process memory using Mimikatz, what do we observe?...
(Дальше скрин в посте, хорошая статья)

#Beacon
Red Team Fails - “Oops my bad I ruined the operation”, a story on how to fail a red team assessment.

https://swisskyrepo.github.io/Drink-Love-Share-Rump/

#Beacon
PENTEST_AD.pdf
35.6 MB
This book is truly intended to be an all-in-one guide for security professionals who work with Windows-
based infrastructure, especially AD. Penetration testers and red team operators will find practical
attack scenarios that they may encounter during real-life assessments. Security and IT engineers, as
well as blue teamers and incident responders, will benefit from detection and remediation guidelines.
To get the most out of this book, you should have basic knowledge of Windows services and AD

#Beacon
🥱1
Прикольный и интересный гайдик по основа редтима (да, это база)

Active Directory (Attack & Defense )
understand the specific tactics, techniques, and procedures (TTP) attackers are leveraging to compromise the active directory, this document is being updated regularly grabbed from different sources

https://0xsp.com/offensive/active-directory-attack-defense/#Discovery
Вкусно
Forwarded from RedTeam brazzers (Миша)
Media is too big
VIEW IN TELEGRAM
вот-с в mp4 :)
Telegram has been hacked

#Beacon

https://youtu.be/6JY3uaLSflk