Outflank

@OutflankNL

Clear advice with a hacker mindset. Specialised in digital attack simulation, red teaming, trainings for blue teams and advanced penetration tests.

Vrijeme pridruživanja: ožujak 2017.

Tweetovi

Blokirali ste korisnika/cu @OutflankNL

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @OutflankNL

  1. 29. sij

    New training dates for our public DAMTA training! Date: April 14-15-16 Location: Amsterdam Stroopwafels guaranteed! More info and registration via

    Poništi
  2. proslijedio/la je Tweet
    21. sij

    Spray-AD, a Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords, by

    Poništi
  3. proslijedio/la je Tweet
    18. sij

    Okay here it is, Zipper a new file and folder compression utility for CobaltStrike. Blue Teams/Hunters/Defenders: Lookout for non file-compression related processes creating (random named) zipfiles within temp folders.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. sij

    New tool coming soon... Zipper, a CobaltStrike tool written in C which allows you to compress files and folders from local and UNC paths. Useful for RedTeams when large files/folders need to be exfiltrated.

    Poništi
  5. proslijedio/la je Tweet
    9. sij

    Spray-AD, a new Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    9. sij
    Odgovor korisnicima

    Of course, but depends on .NET which “in some cases” you want to avoid. You can read more about this topic in our blog:

    Poništi
  7. proslijedio/la je Tweet
    9. sij

    Video recording of my presentation with at Black Hat Asia 2019 is online. MS Office in Wonderland: 50 minutes of offensive tradecraft with Word and Excel. Exploiting fields, Power Query, VBA stomping, Excel4 macros, AMSI bypasses and more fun.

    Poništi
  8. proslijedio/la je Tweet
    26. pro 2019.

    Stan Hegt () from will present a talk on “COMpromise: remote code execution in Windows development” at . 🎟️Register today👉

    Korisnici , i
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    23. pro 2019.

    Automated AD lab deployment. Really awesome work

    Poništi
  10. proslijedio/la je Tweet
    20. pro 2019.

    Invoke-ADLabDeployer. Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams

    Poništi
  11. proslijedio/la je Tweet
    21. pro 2019.

    Cool! My lightning talk submission for is accepted: "The caveats of implementing smart cards and MFA in Active Directory". 25 Minutes packed with nasty security details of AD, Kerberos and NTLM. Looking forward to another edition of this awesome conference!

    Poništi
  12. proslijedio/la je Tweet
    19. pro 2019.

    It’s a wrap! That were three awesome days of “Defend against modern targeted attacks” training by I even managed to steal a stroopwafel! thanks to and

    Poništi
  13. proslijedio/la je Tweet
    4. pro 2019.

    Hey twitterverse, what EU based red teaming / adversary simulation firms are there that have some respectable skills? I know of and But what others? May also be internal teams!

    Poništi
  14. proslijedio/la je Tweet
    26. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    30. lis 2019.

    Our new blog post on abusing the SYLK file format. This 1980s file type can host macros in modern versions of MS Office / Excel without hitting protected mode. Post includes recommendations for mitigation (note: active abuse in the wild).

    Poništi
  16. 29. lis 2019.

    A last minute cancellation means that we have 1 open spot for the next running of our DAMTA training on 26-28 Nov in Utrecht. More info as well as registration via

    Poništi
  17. proslijedio/la je Tweet
    22. lis 2019.

    New C# Tradecraft -> SharpHide. A nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null terminated) registry key.

    Poništi
  18. 22. lis 2019.
    Poništi
  19. proslijedio/la je Tweet
    14. lis 2019.

    Net-GPPPassword, 's C#/.NET port of 's PowerShell-based Get-GPPPassword. Retrieves plaintext password for accounts pushed through Group Policy Preferences. The technique is dated, but still valuable in some of our gigs.

    Poništi
  20. proslijedio/la je Tweet
    20. lis 2019.

    New blog and Recon-AD tool: Active Directory Recon using ADSI and Reflective DLLs

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·