VirtualSamurai

49 posts

VirtualSamurai banner
VirtualSamurai

VirtualSamurai

@VirtualSamuraii

Hello friend

Beigetreten Ocak 2021
181 Folgt295 Follower
VirtualSamurai retweetet
CyberWave
CyberWave@cyb3rw4v3·
🔥 New SQL Injection training module released on the platform. One of the most critical and widely exploited web vulnerabilities. - SQL basics - In-band injections - Inferential (blind) injections - OOB injections 🏴‍☠️ : training.cyberwave.network/module?id=14 #appsec #cybersecurity
English
0
1
2
127
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
@mika_sec Bien joué l’artiste ! Petit souvenir en mémoire du bon vieux temps
VirtualSamurai tweet media
Français
1
1
1
97
Mika
Mika@mika_sec·
Thank you guys 🫡
TryHackMe@tryhackme

2000 days. Zero excuses. Meet Kevin, also know as @mika_sec by our community! He didn’t just build a streak, he transformed his entire career. From early-morning coffee sessions to landing a role as a Cyber Security Engineer. Kevin’s TryHackMe journey is the blueprint for what happens when you commit to becoming better every day. If you need a sign to start (or restart) your cyber journey, this is it. 👉 Read Kevin’s full story on the blog: tryhackme.com/resources/blog…

English
3
1
11
876
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
NEW RED TEAM LAB 🏴‍☠️ You're starting a red team engagement tomorrow... - How would you manage to evade defense solutions (AV/EDR) ? - Where would you train without spending tons of money ? If you don't have the answers to these questions, don't worry, I got you covered. I'm planning to release a new #redteam lab on @cyb3rw4v3 consisting of : - A fictional company "on-prem" Windows #ActiveDirectory domain - 5 intentionally vulnerable machines - Antivirus and firewall This vulnerable playground simulates a real world enterprise network, implements common vulnerabilities and misconfigurations and goes through the whole cyber kill chain (initial access, privilege escalation, lateral movement, defense evasion...). Forget about the building/deploying/hosting part and focus only on what matters : your skills and tradecraft. I'm also doing a #giveaway competition. I'm offering free access to the lab for 3 individuals ! How to join : 1️⃣ Like 2️⃣ Retweet Winners announced on November 1st @ 5 PM UTC+2
VirtualSamurai tweet media
English
4
6
13
1.1K
VirtualSamurai retweetet
CyberWave
CyberWave@cyb3rw4v3·
You're starting a #redteam engagement tomorrow...Where would you train without spending tons of money ? We are releasing a new redteam lab with : - On-prem #ActiveDirectory - 5 vulnerable machines - Antivirus & Firewall Available on November 8th here : training.cyberwave.network
GIF
English
0
3
7
1K
Rtl Dallas
Rtl Dallas@RtlDallas·
Released my Cobalt Strike BOF for fork & run injection! Features Draugr stack spoofing, PPID spoofing, multiple execution methods, and indirect syscalls for enhanced OpSec. github.com/NtDallas/BOF_S…
Rtl Dallas tweet media
English
6
76
278
18.5K
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
Is smishing more dangerous than phishing? It takes a few minutes to register on a SMS service, change the SenderID and pretend to be a known contact to a victim. Here, I'm pretending to be OVHcloud and I’ve sent a SMS to myself. The iOS Message application even displays the fake SMS after the legitimate ones, making detection even less obvious.
VirtualSamurai tweet media
English
0
0
3
260
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
During a Red Team engagement, one must be aware of every action, even when it comes to Wi-Fi testing. Sometimes, we have to send "deauthentication" packets to authenticated devices using tools like Aireplay-ng, in an attempt to capture a handshake and access the targeted network through Wi-Fi. While defenders could quite easily monitor the deauth attacks using the following filter on Wireshark : wlan.fc.type_subtype == 12, sometimes attackers forget to use the appropriate options that could really enhance their OPSEC. For example, there's two options "-h" and "-s" in Aireplay-ng that both allow us to specify the source MAC address, replacing it with the access point's MAC address to mimick a legitimate deauth packet sent by the router.
VirtualSamurai tweet mediaVirtualSamurai tweet media
English
0
1
7
240
VirtualSamurai retweetet
CyberWave
CyberWave@cyb3rw4v3·
🛜 Hackers sometimes gain access to a company's Wi-Fi network. In this blog post, we share some insights about a Wi-Fi (WPA2-Enterprise) penetration test that we conducted for an organisation. cyberwave.network/test-dintrusio…
CyberWave tweet media
English
0
2
2
272
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
I did a DNS resolution on more than 4 million domain names with the .fr TLD Result: around 3.5 million domains might be spoofed by attackers because they don't have a DMARC record (let alone an SPF record). Domains belonging to companies such as Microsoft are also vulnerable.
VirtualSamurai tweet media
English
0
0
2
209
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
Hey there 👋🏼 I have been using an Ansible playbook to deploy a phishing server on a cloud instance for my engagements. Thought it might be useful for cyber security professionals out there. github.com/VirtualSamurai…
English
1
35
129
8.1K
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
Salut 👋🏼 Voici un petit article qui explique comment il est possible de personnaliser des outils publics pour contourner les antivirus. Ici, il s’agira de personnaliser l’agent Apollo du C2 Mythic pour contourner Windows Defender. virtualsamuraii.github.io/redteam/custom…
Français
0
2
16
604
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
OSINT : Certaines entreprises divulguent des informations bien trop précieuses dans leurs offres d'emploi. C'est par exemple le cas ici, l'entreprise en question donne même la marque de son EDR. Ceci peut aider les attaquants à développer des malwares (implants, loaders, packers) taillés spécifiquement pour contourner cet EDR. Dans le cadre d'un exercice Red Team, généralement les attaquants collectent ce genre d'informations pour mieux préparer leurs TTPs. Mais en dehors du cadre légal, les ransomgangs et autres groupes étatiques (APT) peuvent en profiter pour déployer des rançongiciels ou des portes dérobées (espionnage industriel).
VirtualSamurai tweet media
Français
0
2
11
792
VirtualSamurai retweetet
Atsika
Atsika@_atsika·
I've just started a blog on #maldev and #redteaming. Nothing fancy yet, just me trying to see if I've understood correctly. The first post is about a custom version of GetModuleHandle and GetProcAddress in #go. Check it out: blog.atsika.ninja/posts/custom_g…
English
5
33
103
13.5K
VirtualSamurai
VirtualSamurai@VirtualSamuraii·
Hello world 👋 In 2022, @0xNarek and I studied an APT named Serpent Group that has been discovered by @proofpoint and @VMware TAU. This threat actor targeted numerous french government entities during the 2022 presidential campaign. We reproduced their TTPs and came up with our own custom Serpent C2 Server. github.com/VirtualSamurai…
English
1
6
11
1.1K