Forwarded from Red Team Village
Maltrak | Course: In-Depth Red Teaming: APT Adversary Simulation
Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation
@RedTeamVillageRTV
Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation
@RedTeamVillageRTV
🔥1
Red Team Village
Maltrak | Course: In-Depth Red Teaming: APT Adversary Simulation Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation @RedTeamVillageRTV
MODULE 00: Welcome & Introduction
MODULE 01: APT Attacks & Red Team Infrastructure on AWS
MODULE 02: Phishing & Social Engineering Mastery
MODULE 03: Initial Access: Get Your Foot into the Organization Network
MODULE 04: Write Your Own HTTP Malware
MODULE 05: Implement a Plugin Framework in Your Malware with Keylogger Plugin
MODULE 06: Maintaining Persistence In-Depth (Advanced Techniques)
MODULE 07: Rooting: Privilege Escalation Techniques
MODULE 08: Malware Obfuscation: Bypass File Signature Scanning
MODULE 09: Network Obfuscation: Bypass IDS, IPS, NDR, and Machine Learning-Based Tools
MODULE 10: Bypass EDRs & Behavioral-Based Detection
MODULE 11: Impersonating Users: Credential Theft & Token Impersonation
MODULE 12: Hack the Domain Controller Through Lateral Movements
MODULE 01: APT Attacks & Red Team Infrastructure on AWS
MODULE 02: Phishing & Social Engineering Mastery
MODULE 03: Initial Access: Get Your Foot into the Organization Network
MODULE 04: Write Your Own HTTP Malware
MODULE 05: Implement a Plugin Framework in Your Malware with Keylogger Plugin
MODULE 06: Maintaining Persistence In-Depth (Advanced Techniques)
MODULE 07: Rooting: Privilege Escalation Techniques
MODULE 08: Malware Obfuscation: Bypass File Signature Scanning
MODULE 09: Network Obfuscation: Bypass IDS, IPS, NDR, and Machine Learning-Based Tools
MODULE 10: Bypass EDRs & Behavioral-Based Detection
MODULE 11: Impersonating Users: Credential Theft & Token Impersonation
MODULE 12: Hack the Domain Controller Through Lateral Movements
👍2
⚡ CS 390R: Reverse Engineering and Vulnerability Analysis Free Course
https://pwn.umasscybersec.org/lectures/index.html#
https://pwn.umasscybersec.org/lectures/index.html#
👍1
Hiding Linux Processes with Bind Mounts
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
Linux Hardening Guide.
• Choosing the right Linux distribution;
• Kernel hardening;
• Mandatory access control;
• Sandboxing;
• Hardened memory allocator;
• Hardened compilation flags;
• Memory safe languages;
• The root account;
• Firewalls;
• Identifiers;
• File permissions;
• Core dumps;
• Swap;
• PAM;
• Microcode updates;
• IPv6 privacy extensions;
• Partitioning and mount options;
• Entropy;
• Editing files as root;
• Distribution-specific hardening;
• Physical security;
• Best practices.
https://madaidans-insecurities.github.io
#Linux
• Choosing the right Linux distribution;
• Kernel hardening;
• Mandatory access control;
• Sandboxing;
• Hardened memory allocator;
• Hardened compilation flags;
• Memory safe languages;
• The root account;
• Firewalls;
• Identifiers;
• File permissions;
• Core dumps;
• Swap;
• PAM;
• Microcode updates;
• IPv6 privacy extensions;
• Partitioning and mount options;
• Entropy;
• Editing files as root;
• Distribution-specific hardening;
• Physical security;
• Best practices.
https://madaidans-insecurities.github.io
#Linux
❤1👍1👎1
Malware Development - Evading Diaries.
• NTFS Files Attributes;
• FuncIn;
• Code Cave;
• Stolen Certificate;
• Redirect Antivirus Website Evading Techniques;
• Shortcut Hiding;
• Disabling Antivirus;
• Adding Antivirus Exception;
• Fake Signature;
• Mark-Of-The-Web (MOTW) Bypass;
• Return Address Spoofing;
• Runtime Function Decryption;
• DLL Unhooking;
- How DLL Unhooking Works;
- Unhooking Strategies;
• Evasion Using Direct Syscalls;
- Key Aspects of This Technique;
- Operational Mechanism;
- Featured Windows APIs;
• Unloading Module With FreeLibrary;
- Operational Overview;
- Key Aspects of This Technique;
- Featured Windows APIs;
• References.
#Malware
• NTFS Files Attributes;
• FuncIn;
• Code Cave;
• Stolen Certificate;
• Redirect Antivirus Website Evading Techniques;
• Shortcut Hiding;
• Disabling Antivirus;
• Adding Antivirus Exception;
• Fake Signature;
• Mark-Of-The-Web (MOTW) Bypass;
• Return Address Spoofing;
• Runtime Function Decryption;
• DLL Unhooking;
- How DLL Unhooking Works;
- Unhooking Strategies;
• Evasion Using Direct Syscalls;
- Key Aspects of This Technique;
- Operational Mechanism;
- Featured Windows APIs;
• Unloading Module With FreeLibrary;
- Operational Overview;
- Key Aspects of This Technique;
- Featured Windows APIs;
• References.
#Malware
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
👍1
Forwarded from CyberSecurityTechnologies (-CST-)
exploits_2024.tgz
167.6 MB
Telegram DataBase 2019 - 2023 150m
https://drive.google.com/file/d/1Ks9irnhv_0Yo_uHIp0K5VCRZAWLWe1fA/view?ts=677a5aab
https://drive.google.com/file/d/1Ks9irnhv_0Yo_uHIp0K5VCRZAWLWe1fA/view?ts=677a5aab
Daily OS Explorations | Exploring Operating Systems
https://mohitmishra786.github.io/exploring-os/src/
https://mohitmishra786.github.io/exploring-os/src/
Forwarded from The Bug Bounty Hunter
Stealing HttpOnly cookies with the cookie sandwich technique
https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique
https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique
👍1