Actores maliciosos Rusos 🇷🇺 infectan usuarios mediante documentos compartidos en DropBox y Google Drive
❌Mucho cuidado con abrir ficheros ISO de dudosa procedencia
unit42.paloaltonetworks.com/cloaked-ursa-o…
- "... and then he said to sign my malware.exe with faked Microsoft cert to evade AVs/EDRs. Would you believe?"
( ̄y▽ ̄)╭ Ohohoho.....
Sign-Artifact.ps1 - based on @mattifestation research & implementation shamelessly borrowed here:
github.com/mgeeky/Penetra…
Reverse Port Forward through a SOCKS Proxy in Cobalt Strike, how cool is that :=) smbmap (by ShawnDEvans) and CrackMapExec (by @byt3bl33d3r) tools used for SMB share enumeration and Lateral Movement 🔥
Hello !
FuckThatPacker is now integrated to CobaltStrike. You can now generate obufscated powershell payloads directly within CobaltStrike :D
github.com/Unknow101/Fuck…
retweet appreciated
I published a blog article detailing a phishing technique I called Browser in the Browser (BITB) Attack. It's very simple but can be very effective. I also published templates on my Github feel free to test them out.
mrd0x.com/browser-in-the…
If you compromise a member of the Backup Operators group there is a direct path the become Domain Admin without a RDP/WinRM access to the DC !
Dump and export the SAM remotely on a remote share ! 🔥🎉
Thanks to @filip_dragovic for the initial POC !
github.com/mpgn/BackupOpe…
Hello all !
Après une longue pause je vous propose un article de #RedTeam traitant de l'Initial Access et plus particulièrement de l'HTML Smuggling. Technique utilisée par des APTs dont j'ai pu constater l'efficacité lors d'un test interne.
Bonne lecture.
inf0sec.fr/article-21.php
Had a play around with getting a POC for SOCKS proxying a browser using Kerberos Relaying today, seems to work well. Next to run it on a pentest to see if it works outside the lab, and then I'll shove the code up. youtu.be/7q8r39gF1rU
Black Week has started @ SEKTOR7 Institute!
For the next 7 days you can purchase any course with $30 off the regular price.
Cyber Monday is a deadline, so don't wait too long!
institute.sektor7.net#RTO#redteam#onlinelearning
GC2 - A Command And Control Application That Allows An Attacker To Execute Commands On The Target Machine Using Google Sheet And Exfiltrate Data Using Google Drive ift.tt/3GxjV2O