Scriptmonkey_

7.3K posts

Scriptmonkey_

Scriptmonkey_

@scriptmonkey_

Tester of Pens, Ex-Teamer of Red things, now with a more purpley shade. Biker and Recovering Eve-Online Addict. o7 [email protected] & https://t.co/QvMpQ3IQwQ

United Kingdom 参加日 Haziran 2010
1.3K フォロー中1.4K フォロワー
固定されたツイート
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
Bang on Iain! As much as the example in the blog post works, getting c2 over any form of filesystem, is the real gem here. Even locally for privesc, get a system shell without worrying about proxies for example. Looking forward to see what folk come up with use case wise.
@[email protected]@strawp

This is such a cool C2 channel technique. Use network file share, RDP mapped drives and anywhere else more than one host sees the same filesystem as a C2 channel which really doesn't get logged. Simple but effective!

English
0
0
5
0
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@0xTib3rius @WifiRumHam May I offer you a name suggestion for your merger? The Cyber Reconnaissance and Autonomous Penetration Suite for Heuristic Offensive Operations and Testing #CRAPSHOOT
English
0
0
0
23
Tib3rius
Tib3rius@0xTib3rius·
I am about to COMPLETELY disrupt the cybersecurity industry...💀💀💀 Presenting the Continuous Reasoning AI Pentester! Multiple AI agents running every security tool under the sun against your environment, at record speeds. Full pentests achieved in less than AN HOUR. Zero human input. One hundred percent success.
English
201
292
2.7K
246.9K
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@TNHillbillyHack @domchell Which ethically brings it back to assume breach. Humans will fold under the right pressure, if you want to simulate the coercion of someone. You read them in and use them as your foothold. I don't need to bribe a call center employee, they just have to follow my instruction.
English
0
0
1
20
Warrior of America's Ragnarök
Warrior of America's Ragnarök@TNHillbillyHack·
@domchell Full scope is the future of Red Teaming, no matter what tool/control you deploy, people are the weak part. I once proposed to a client something so awful morally but not beyond scope for real bad guys, wouldn't even let me dial it back to bribing call center employees.
English
1
0
1
340
Dominic Chell 👻
Dominic Chell 👻@domchell·
My thoughts are yes, red teaming has got significantly harder over the last few years. The knock on effect is: 1) engagements need more time, 2) teams who don't invest heavily in R&D (either in-house or outsourced) will be left behind, 3) there's less things shared publicly as a consequence, 4) lots of teams have tried to compensate by assuming breach, which as a result has led to less innovation in the IA space However, I disagree that IA is anywhere near dead even targeting the top 1%. The vast majority of our engagements have a large IA component and we're still successful in >75% of cases. Yes the points mentioned are a pita - AWL is a great control, but there's equally a plethora of file formats that support scripting; get creative - Yes MOTW restricts some things - but there's a variety of ways around it if you're creative (and I'm not talking about ISOs 🙄)
Chris Spehn@ConsciousHacker

I guess we'll talk a bit about modern red teaming. The difficulty has increased severely. Lots of people be like just vibe code a stage0 with legit code for your pretext. How are you delivering it to bypass app control? Lots of words, no substance.

English
7
40
223
36.4K
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@Officialwhyte22 D. As you asked - most likely. The chance my mate's wifi is being targeted is low and ET will generally affect other devices and is usually accompanied by deauths. So they're targeting my device only, but at my mates? Nah. It's D or E. My mates being a dick and fucking with me.
English
0
0
0
11
Winston Ighodaro
Winston Ighodaro@Officialwhyte22·
Ethical Hacker Question You connect your laptop to a friend’s Wi-Fi. Later, you notice: Your browser keeps redirecting to login pages HTTPS certificates look different Other devices on the network behave normally What is the MOST LIKELY issue? A. Evil Twin Wi-Fi access point B. Broken browser cache C. Outdated TLS version D. Normal captive portal behavior
English
36
9
79
14.6K
kanav
kanav@kanavtwt·
is it userId, userID or user_id?
English
711
21
892
193.2K
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@UK_Daniel_Card I don't get the need for rage. Surely it's... From ffmpeg: "you're welcome to submit a pull request". From sec researcher it's: "I've given <project> all the time I'm willing to. Time for a CVE." From user it's: "ffmpeg has a vulnerability we do not like, we'll switch to xyz"
English
0
0
14
659
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Look how mad some people get.... it's insane really....
mRr3b00t tweet media
English
35
9
482
21.1K
Karl (RIP )
Karl (RIP )@supersat·
Found this beauty in the Rise of the Resistance queue at @Disneyland It seemed FAR too realistic, even by Disney standards, to be a random custom-made prop (1/2)
Karl (RIP ) tweet media
English
6
1
75
92K
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
"OpSec is hard" if you think this and you've only worked on an external team. Just wait until you work for an internal one. 😅
GIF
English
0
0
0
66
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@hakluke Might be too in the weeds but the fact that for some reason it appears the world has happily renamed DLL Hijacking to DLL sideloading despite its specific meaning, and this grinds my gears.
English
0
0
2
118
Luke Stephens (hakluke)
Luke Stephens (hakluke)@hakluke·
What’s your cybersecurity take that’s got you like this? I’m heading out but when I’m back I’ll drop some of my own in the comments.
Luke Stephens (hakluke) tweet media
English
125
15
223
69.1K
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@BaffledJimmy Very similar to one of my favourite presenters on leadership and team dynamics: Nickolas Means youtu.be/099cHWSbAL8?si… He's done a few (3 mile island, fukashima, etc), might be worth a look :) would definitely watch you presenting similar at a con aimed at cyber.
YouTube video
YouTube
English
0
0
2
62
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@downpressor @IceSolst Wrong perpetrator and the wrong law. Try thanking the commercial entities who deliberately employ hostile UX and the amendments to the ePrivacy directive in 2009 which is when cookie notices became a requirement. None of the privacy laws force providers to use hostile UX.
English
0
0
0
25
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Absolutely meaningless to 99.9% of your users, serving solely to enshitify the experience in spitefully malicious compliance. Complete failure of a control.
solst/ICE of Astarte tweet media
English
11
7
124
6.4K
Kr$na
Kr$na@krishdotdev·
Which one do you prefer ? - userID - user_ID - UserID - userId - user-id
English
836
38
941
124.9K
Sam ☕
Sam ☕@samirande_·
What's stopping you from becoming like him?
Sam ☕ tweet media
English
624
151
3.7K
238.9K
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@_CRUXNET @arpeyton @nickvangilder No not at all, i'm saying an entry level penetration tester is not an entry level IT position. Hence why i'm already expecting them to have experience in IT and apply security concepts to their domain experience.
English
1
0
0
28
Nick VanGilder
Nick VanGilder@nickvangilder·
I would argue that the massive flood of new people trying to “break in” as juniors has actually raised the bar for juniors. Every day, hundreds of people wake up and decide they want to become a 5up3r l33t penetration tester or hax0r. And that’s awesome. There’s two problems though: 1) there just aren’t that many penetration testing roles available and 2) employers want to hire the best of the best. We might not like it, but when there’s a major surplus of candidates (and there is), employers can afford to be picky. And they will be. Can you blame them? That’s just supply and demand at work. When the market shifts and there’s a shortage of qualified talent for these roles, requirements loosen. But right now? The market’s flooded, the bar’s getting higher, and the competition is fierce. Plan and adjust accordingly.
Nick VanGilder tweet media
English
39
37
555
165.1K
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@_CRUXNET @arpeyton @nickvangilder That's not really an answer to what I stated. Yes, compliance will be part of a junior's job (in as much as its part of a senior's too) but it isn't (or shouldn't be) all a junior is expected to do. If I needed that, i'd employ a Vuln. Analyst as part of a Vuln Mgmt team.
English
1
0
0
31
Luke Stephens (hakluke)
If you had to pick ONE cybersecurity news source what would you pick?
English
14
1
22
8.6K
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@nickvangilder For me, an entry level in penetration testing is not an entry level position in IT. They should have experience across the domain already, that they can apply to identify security issues. I think that's the issue here, lots of people thinking junior = "just nessus" when its not
English
1
0
2
98
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@_CRUXNET @arpeyton @nickvangilder Why are you expecting your entry level staff to do nothing but run nessus? I'm expecting them to apply their knowledge across the IT domain to find holes and misconfigurations in security. Your concept of entry level for penetration testing seems off.
English
1
0
0
39
CRUXNET
CRUXNET@_CRUXNET·
It's absolutely not appropriate for junior level cybersecurity roles. The OSCP requires you to pwn 5 computers, two of which are Active Directory, within 24 hours, then write reports on all 5 within the next 24 hours. In no world am I hiring a junior to do all that. Or am I just supposed to underpay an actually experienced pentester? Because to demand an OSCP from someone for a junior role means you're giving them junior pay and if they have the skill to do that why the hell am I hiring them for an entry-level testing position that will at most have them just doing said nessus scans and learning from seniors?
English
1
0
1
128
Scriptmonkey_
Scriptmonkey_@scriptmonkey_·
@hakluke Alva Duckwall's presentation is worth a look if you're up against 802.1x youtu.be/rurYRDlf1Bo?si… There have been follow up talks in more recent confs, and tools on github that broadly automate these attacks now, but this starts at the beginning.
YouTube video
YouTube
English
1
1
13
1.9K
Luke Stephens (hakluke)
Red teaming tip: Up against a NAC, but need to plug your device in? - Plug a switch into the ethernet port on the wall - Plug a legitimate device into the port that is allowed by the NAC (like a printer or employee laptop) - Wait for a bit - Plug your evil device into the switch - ✨ Access granted ✨
English
13
22
215
31.4K