Posts related to red teaming.

DNS Tunneling for Defense Evasion and Command and Control

DNS TUNNELING FOR DEFENCE EVASION AND COMMAND AND CONTROL This blog post was written by Alex Maina. Introduction Before we look at exploiting DNS through DNS tunneling we need to understand DNS and how it is critical to an organization’s infrastructure. DNS is used to translate IP addresses into domain [...]

By |2021-05-16T19:49:56+03:00May 20th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Capturing NetNTLM V2 hashes Via Outlook Signatures

CAPTURING NET-NTLM V2 HASHES VIA OUTLOOK SIGNATURES This blog post was written by Dharmik Karania. Introduction Today, it is possible to craft a malicious email that allows an adversary to capture NetNTLMV2 hashes without requiring any form of interaction with the user. The user only has to click open the [...]

By |2021-05-24T15:36:57+03:00May 17th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Persistence: Common Userland Techniques (Part 2)

PERSISTENCE: COMMON USERLAND TECHNIQUES (PART 2) This blog post was written by Dharmik Karania and Amarjit Labhuram Introduction In Persistence Part 1, we looked at a couple of Userland Persistence Techniques. In this blog, we continue with other techniques which include Dynamic Link Library (DLL) Hijacking through [...]

By |2021-05-19T13:22:23+03:00May 13th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Persistence: Common Userland Techniques (Part 1)

PERSISTENCE: COMMON USERLAND TECHNIQUES (PART 1) This blog post was written by Amarjit Labhuram. Introduction Getting an initial foothold during a red team operation can be time consuming and come with its own challenges. Once an operator has a command and control channel established into the client [...]

By |2021-05-19T13:09:41+03:00May 10th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Hunting Insecure Direct Object References (IDORs)

HUNTING INSECURE DIRECT OBJECT REFENCES (IDORs) This blog post was written by Rodney Kariuki. Introduction Insecure Direct Object Reference (IDOR) is a type of access control vulnerability that arises when the references to data objects (like a file or a database entry) are predictable, and the application uses user-supplied input [...]

By |2021-03-22T19:30:48+03:00March 22nd, 2021|Offensive Security, Penetration Testing, Red Teaming|

Windows Privilege Escalation

WINDOWS PRIVILEGE ESCALATION This blog post was written by Varun Gupta. Introduction Privilege escalation happens when a malicious user exploits a vulnerability in an application or operating system to gain elevated access to resources that should normally be unavailable to that user. The attacker can then use the newly gained [...]

By |2021-03-15T08:24:36+03:00March 15th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Initial Access With Maldocs – A TTP Story

INITIAL ACCESS WITH MALDOCS This blog post was written by Amarjit Labhuram. Introduction Phishing and spear phishing are the most common and effective ways adversaries are using to get access into corporate networks. For adversaries the pain of trying to get a 0-day on the infrastructure a [...]

By |2024-05-20T21:58:30+03:00February 10th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Phishing Attacks With Evilginx2

PHISHING ATTACKS WITH EVILGINX2 This blog post was written by Varun Gupta. IntroductionEvilginx2 is an attack framework for setting up phishing pages. Instead of serving templates of sign-in pages look-alikes, Evilginx2 becomes a relay (proxy) between the real website and the phished user. Phished user interacts with the real [...]

By |2021-07-28T15:04:46+03:00January 25th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Hacking Android Phones With Malicious APK

HACKING ANDROID PHONES WITH MALICIOUS APK This blog post was written by Rodney Kariuki. Introduction It is possible to exploit the actual android device of a user by installing malicious payloads on their phones in form of Android Application Packages (APKs), or by trojanizing a legitimate application. [...]

By |2021-01-21T10:39:29+03:00January 19th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Vegile (Unlimited Shell In Linux Using Metasploit)

VEGILE (UNLIMITED SHELL IN LINUX USING METASPOILT) This blog post was written by Alex Maina. Introduction This blog will talk about maintaining persistence in Linux using Vegile. Vegile (Ghost in the Shell) is a tool for post-exploitation. Post exploitation technique will ensure that we maintain some level of access [...]

By |2021-01-21T10:55:32+03:00December 13th, 2020|Offensive Security, Penetration Testing, Red Teaming|
Go to Top