Penetration testing applications for iOS/Android are essential tools to assess the security of mobile apps. This blog covers jailbreak/root methods, important files/folders, hooking, SSL pinning, content providers & more.
redteamrecipe.com/mobile-pente...
#infosec #pentest
Penetration testing applications for both iOS and Android platforms serve as invaluable tools for security professionals and ethical hackers to assess the security posture of mobile applications. These applications typically offer a range of features...
redteamrecipe.com
A nice blog post that presents some attack techniques using the Kerberos protocol🕵️♂️
labs.lares.com/fear-kerbero...
#infosec #cybersecurity #kerberos #redteam #pentest
Still writing #pentest reports manually? Faction is free, #opensource, and automates all the things!
A nice collection of different Amazon S3 bucket misconfigurations🕵️♂️
blog.plerion.com/things-you-w...
#infosec #cybersecurity #pentest #redteam #cloud #aws
The "Living Off the Living Off the Land" website provides a great list to various projects, including binaries, scripts, libraries, drivers, and other tools that can be exploited by attackers to bypass security controls.
lolol.farm
#infosec #pentest #redteam #blueteam
sans nulle doute le meilleur VPN pour les amateurs de sécurité #informatique #Geek #pentest #hacking
airvpn.org?referred_by=...
Learn how to effectively select and categorize domains to avoid getting blocked by reputation checks in phishing campaigns.
One Phish Two Phish, Red Teams Spew Phish - How to Give your Phishing Domains a Reputation Boost
posts.specterops.io/one-phish-tw...
#infosec #pentest #redteam
How to Give your Phishing Domains a Reputation Boost
posts.specterops.io
Purple Knight - another great and free tool to find, prioritize, and fix security gaps while reducing the attack surface of your Active Directory, Entra ID, and Okta.
www.semperis.com/purple-knight/
#infosec #pentest #blueteam
Purple Knight, built by Semperis, is the top Active Directory security assessment tool today. Identify threats and get prioritized guidance.
www.semperis.com
Deploy your own (Active Directory) lab environment in minutes! All you need is a browser to access your lab environment. A Snap Labs (Immersive Labs) Community Edition account (free) and an AWS account are required.
www.blackhillsinfosec.com/deploy-an-ac...
#infosec #pentest #redteam #blueteam
Creating your own lab can sound like a daunting task. By the end of this blog post, you will be able to deploy your own Active Directory (AD) environment in […]
www.blackhillsinfosec.com
Using the Windows Security Center service, it is possible to deactivate Windows Defender by telling the service that a different antivirus program is being used🛡️
github.com/es3n1n/no-de...
#infosec #cybersecurity #pentest #redteam #defender
A slightly more fun way to disable windows defender + firewall. (through the WSC api) - es3n1n/no-defender
github.com
New cheatsheets pushed🕵️♂️
github.com/r1cksec/chea...
Including:
A nice blogpost about different ntlm relay attack scenarios🖥️
www.guidepointsecurity.com/blog/beyond-...
#infosec #cybersecurity #pentest #redteam #ntlm
A post about macOS Red Teaming
redteamrecipe.com/macos-red-te...
#infosec #pentest #redteam
macOS red teaming involves simulating cyber-attacks on macOS environments to identify vulnerabilities, assess security posture, and improve defensive measures. This process encompasses a wide array of techniques, tools, and methodologies aimed at mim...
redteamrecipe.com
This post highlights some possibilities for NTLM relay attacks:
-Enumerating AD usernames (non-Admin SMB relay)
-Relaying to MS SQL
-Relaying to LDAP and configuring RBCD
-Shadow Credentials Attacks
www.guidepointsecurity.com/blog/beyond-...
#infosec #pentest #redteam
This post describes the patch-diffing and exploitation process of CVE-2024-24919 (Path Traversal Checkpoint Security Gateway)🕵️♂️
labs.watchtowr.com/check-point-...
#infosec #cybersecurity #redteam #pentest
Very informative blog post, providing an overview of assumed breach methods and how they could change your next round of offensive testing. It's worth reading.
Assumed Breach: The Evolution of Offensive Security Testing
trustedsec.com/blog/assumed...
#infosec #pentest #redteam
A good post about the possibility of using Temporary Access Pass to obtain the NT Hash of a user🕵️♂️
dirkjanm.io/lateral-move...
#infosec #cybersecurity #entra #azure #redteam #pentest
Check and harden your Active Directory with #PingCastle! This powerful tool identifies vulnerabilities, spots misconfigurations, and helps you ensure your Active Directory remains robust and secure.
www.pingcastle.com/download/
#infosec #blueteam #pentest
Download PingCastle binaries and source code to audit your Active Directory or get the map of your domains.
www.pingcastle.com
A blog post that explores how attackers can abuse Exchange permissions in Active Directory, the impact of different Exchange permission models, and what organizations can do to reduce these risks.
posts.specterops.io/pwned-by-the...
#infosec #pentest #redteam #blueteam
How MS Exchange on-premises compromises Active Directory and what organizations can do to prevent that
posts.specterops.io
This posts describes how write access on storage account blob service or files service can be used to upload a malicious payload🕵️♂️
whiteknightlabs.com/2024/05/07/a...
#infosec #cybersecurity #entra #azure #redteam #pentest
Would you like to check your AD CS environment for more possible attack vectors?
Part 2 of this blog post series, will cover the Golden Certificate and ESC3 abuse techniques. Check it out to learn more!
posts.specterops.io/adcs-attack-...
#infosec #pentest #redteam #blueteam
In this blog post, we will cover how we have incorporated the Golden Certificates and the ADCS ESC3 abuse technique in BloodHound.
posts.specterops.io
An interesting way to inject a DLL into the explorer using icons🕵️♂️
github.com/0xda568/Icon...
#infosec #cybersecurity #windows #pentest #redteam
Have you ever checked your Active Directory Certificate Services environment for possible attack paths?
Check out this blog post detailing ESC1 domain escalation requirements and how BloodHound identifies these attack paths.
posts.specterops.io/adcs-attack-...
#infosec #pentest #redteam #blueteam
Since Will Schroeder and Lee Christensen published the Certified Pre-Owned whitepaper, the BloodHound Enterprise team at SpecterOps has…
posts.specterops.io
quicmap by @bojanz.bsky.social - A scanner to identify QUIC services, protocol version in use as well as supported ALPN's.
github.com/bojanisc/qui...
Check out the SANS ISC diary about "Scanning and abusing the QUIC protocol" too.
isc.sans.edu/forums/diary...
#infosec #pentest #redteam
quicmap is a simple yet quic (!) QUIC protocol scanner - bojanisc/quicmap
github.com
A nice blog post that explores what permissions Exchange has in Active Directory that an attacker can abuse to compromise the domain🕵️♂️
posts.specterops.io/pwned-by-the...
#infosec #cybersecurity #Active_Directory #exchange #pentest #redteam
A somewhat older blog post, but still relevant in many organizations. A list of 16 most common Active Directory vulnerabilities and misconfigurations.
www.infosecmatter.com/top-16-activ...
#infosec #pentest #redteam #blueteam
Practical steps on how to pentest Active Directory environments using a list of most common AD vulnerabilities. Tools and command examples for testing and exploitation of AD vulnerabilities.
www.infosecmatter.com
A good introduction to the basics of macOS security architecture🕵️♂️
0xf00sec.github.io/0x1A
#infosec #cybersecurity #macosx #pentest #redteam
This great blog post demonstrates various Resource-Based Constrained Delegation (RBCD) attacks (on both Linux and Windows):
"A Practical Guide To RBCD Exploitation"
medium.com/@offsecdeer/...
#infosec #pentest #redteam
Resource-Based Constrained Delegation is an interesting attack, in the right conditions it allows users to take control of computers and…
medium.com
Using this tool it is possible to scan TURN server for misconfiguration, which could allow access to the internal network🕵️♂️
github.com/firefart/stu...
#infosec #cybersecurity #redteam #pentest
This tool can be used to detect misconfigurations and vulnerabilities in the build pipelines of a repository🚧
github.com/boostsecurit...
#infosec #cybersecurity #pentest #redteam
boostsecurityio/poutine. Contribute to boostsecurityio/poutine development by creating an account on GitHub.
github.com
Living off the False Positive is an autogenerated collection of false positives rule sets🕵️♂️
br0k3nlab.com/LoFP
#infosec #cybersecurity #redteam #pentest #dfir
LDAPmonitor by @podalirius.bsky.social - Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
github.com/p0dalirius/L...
#infosec #pentest #redteam
A short blog post worth reading about the possibility of performing lateral movement via the CcmExec service🕵️♂️
cloud.google.com/blog/topics/...
A corresponding tool is also available.
github.com/mandiant/Ccm...
#infosec #cybersecurity #sccm #windows #pentest #redteam
Great post on how to perform NTLM relaying on a compromised Windows client with builtin tools.
Start a ProxyApp (no admin permission needed), bypass the local firewall and port forward using ssh🕵️♂️
badoption.eu/blog/2024/04...
#infosec #cybersecurity #redteam #pentest #windows #ntlm
A nice overview of the features of the tool azurenum☁️
blog.syss.com/posts/introd...
#infosec #cybersecurity #azure #entra #cloud #pentest
As time goes on, organizations keep moving more and more IT assets into the cloud. More importantly, the Azure cloud plays a paramount role in the IT structure of most companies due to its merging cap...
blog.syss.com
#Drones are a growing threat to law enforcement and security specialists. Low-cost and easy to use, drones can carry out surveillance, capture data, or disrupt networks.
hakin9.org/download/dro...
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding
Drones are a growing threat to law enforcement and security specialists. Low-cost and easy to use, drones can carry out surveillance, capture data, or disrupt networks. Making matters worse, drones ar...
hakin9.org
Awesome Fuzzing by twitter.com/secfigo
Cloud Fuzzers
File Format Fuzzers
Network Protocol Fuzzers
Sandboxes
Anti fuzzing
Tutorials and Blogs
and more.
github.com/secfigo/Awes...
#pentest #cybersecurity
Penetration Test Proposal
~~
What to expect from a penetration test or security assessment proposal from 2nd Sight Lab
~~
#pentest #security #cybersecurity
medium.com/cloud-securi...
What to expect from a penetration test or security assessment proposal from 2nd Sight Lab
medium.com
Penetration Test Proposal
~~
What to expect from a penetration test or security assessment proposal from 2nd Sight Lab
~~
#pentest #security #cyversecurity
medium.com/cloud-securi...
What to expect from a penetration test or security assessment proposal from 2nd Sight Lab
medium.com
Методологія тестування на проникнення криптовалютних бірж
Представляю на огляд методичку з тестування на проникнення криптовалютних бірж.
#pentest #penetrationtesting #methodology #cryptocurrency #cybersecurity #itsecurity #cryptosec #cybersec #пентест #криптобіржі
kr-labs.com.ua/blog/metodyc...
Кібербепзека криптовалютних бірж і смарт-контрактів. Історія, методика тестування на проникнення криптовалютних бірж.
kr-labs.com.ua
This repository serves as a knowledge base for all known Microsoft Configuration Manager measures and the associated instructions for defense and protection 💿
github.com/subat0mik/Mi...
#infosec #cybersecurity #windows #sccm #blueteam #redteam #pentest
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance. - subat0mik/Misconfiguration-Manager
github.com
This repository can be used to search for P/Invoke signatures in .NET assemblies🪱
github.com/MzHmO/Parasi...
#infosec #cybersecurity #windows #redteam #pentest
Hide your P/Invoke signatures through other people's signed assemblies - MzHmO/Parasite-Invoke
github.com
New cheatsheets pushed🕵️♂️
github.com/r1cksec/chea...
Including:
An interesting blog post on how attackers use QEMU to create a tunnel between two networks🖥️
securelist.com/network-tunn...
#infosec #cybersecurity #windows #redteam #pentest #qemu #pivot #tunnel
HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more.
github.com/LasCC/HackTo...
#infosec #pentest
The all-in-one browser extension for offensive security professionals 🛠 - LasCC/HackTools
github.com
Identify the attack paths in BloodHound breaking your AD tiering
github.com/improsec/Imp...
#infosec #pentest #blueteam
Identify the attack paths in BloodHound breaking your AD tiering - improsec/ImproHound
github.com
#SQLinjection in login dialog of web-based #YABOOK harbour administration allows authentication bypass
www.pentagrid.ch/en/blog/sql-...
#pentest #sailing #hafenverwaltung #imonaboat
A GUI + command line RDP client for red teamers
github.com/skelsec/evil...
#infosec #pentest #redteam
This repository serves as a central knowledge base for all known Microsoft Configuration Manager (a.k.a. MCM, ConfigMgr, System Center Configuration Manager, or SCCM) tradecraft and associated defensive and hardening guidance.
github.com/subat0mik/Mi...
#infosec #blueteam #pentest #redteam
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance. - subat0mik/Misconfiguration-Manager
github.com
Pyramid is useful to perform post-exploitation tasks in an evasive manner and executing offensive tools from a signed binary by importing their dependencies in memory.
github.com/naksyn/Pyramid
#infosec #pentest #redteam
a tool to help operate in EDRs' blind spots. Contribute to naksyn/Pyramid development by creating an account on GitHub.
github.com