π [ TrustedSec, TrustedSec ]
Don't suffer a LAPS(e) in judgement! Your tools need protection too. Security Consultant @mega_spl0it outlines how to build #Splunk SPL queries to detect attacks against #MicrosoftLAPS in our new #blog. https://t.co/nhcuC6eZx4
π https://hubs.la/Q01xvpTt0
π₯ [ tweet ]
Don't suffer a LAPS(e) in judgement! Your tools need protection too. Security Consultant @mega_spl0it outlines how to build #Splunk SPL queries to detect attacks against #MicrosoftLAPS in our new #blog. https://t.co/nhcuC6eZx4
π https://hubs.la/Q01xvpTt0
π₯ [ tweet ]
π [ JoelGMSec, Joel GM ]
Nueva herramienta (con la colaboraciΓ³n de @3v4Si0N) y entrada en el #blog!π
Transfiriendo ficheros en entornos restringidos con #InvokeTransfer
https://t.co/rJYxbvdOgm
https://t.co/0ZEgI0TTK2
#Darkbyte #Hacking #PowerShell #Clipboard #DataTransfer
π https://darkbyte.net/transfiriendo-ficheros-en-entornos-restringidos-con-invoke-transfer
π https://github.com/JoelGMSec/Invoke-Transfer
π₯ [ tweet ]
Nueva herramienta (con la colaboraciΓ³n de @3v4Si0N) y entrada en el #blog!π
Transfiriendo ficheros en entornos restringidos con #InvokeTransfer
https://t.co/rJYxbvdOgm
https://t.co/0ZEgI0TTK2
#Darkbyte #Hacking #PowerShell #Clipboard #DataTransfer
π https://darkbyte.net/transfiriendo-ficheros-en-entornos-restringidos-con-invoke-transfer
π https://github.com/JoelGMSec/Invoke-Transfer
π₯ [ tweet ]
π [ TrustedSec, TrustedSec ]
In our newest #blog post, TAC Practice Lead @4ndr3w6S and co-author @exploitph lead us through the examination of #Kerberos ticket times and #checksums to demonstrate their importance and how they can better serve both offensive and defensive operators. https://t.co/kGgsXB0VUO
π https://hubs.la/Q01GMZBS0
π₯ [ tweet ]
In our newest #blog post, TAC Practice Lead @4ndr3w6S and co-author @exploitph lead us through the examination of #Kerberos ticket times and #checksums to demonstrate their importance and how they can better serve both offensive and defensive operators. https://t.co/kGgsXB0VUO
π https://hubs.la/Q01GMZBS0
π₯ [ tweet ]
π [ TrustedSec @TrustedSec ]
Our new #blog post by @mega_spl0it and @4ndr3W6S takes a deep dive into how Active Directory (AD) attribute-based detections can be built and how to identify where an adversary may be hiding. Read the first of this 3-part series now!
π https://hubs.la/Q024-06m0
π₯ [ tweet ]
Our new #blog post by @mega_spl0it and @4ndr3W6S takes a deep dive into how Active Directory (AD) attribute-based detections can be built and how to identify where an adversary may be hiding. Read the first of this 3-part series now!
π https://hubs.la/Q024-06m0
π₯ [ tweet ]
π4
Offensive Twitter
π [ TrustedSec @TrustedSec ] Our new #blog post by @mega_spl0it and @4ndr3W6S takes a deep dive into how Active Directory (AD) attribute-based detections can be built and how to identify where an adversary may be hiding. Read the first of this 3-part seriesβ¦
π [ TrustedSec @TrustedSec ]
In Part 2 of our new #blog series by @mega_spl0it and @4ndr3W6S, they build detections for additional attributes, this time focusing on those that can be modified using the #PowerMad tool. Read it now!
π https://hubs.ly/Q025hFdr0
π₯ [ tweet ]
In Part 2 of our new #blog series by @mega_spl0it and @4ndr3W6S, they build detections for additional attributes, this time focusing on those that can be modified using the #PowerMad tool. Read it now!
π https://hubs.ly/Q025hFdr0
π₯ [ tweet ]
π₯2π1
Offensive Twitter
π [ TrustedSec @TrustedSec ] In Part 2 of our new #blog series by @mega_spl0it and @4ndr3W6S, they build detections for additional attributes, this time focusing on those that can be modified using the #PowerMad tool. Read it now! π https://hubs.ly/Q025hFdr0β¦
π [ TrustedSec @TrustedSec ]
In the third and final installment of our #blog series by @mega_spl0it @4ndr3W6S DACL-based detections are built, identifying attacks that focus on obscure or lesser-known AD Attributes that fall outside of the scope of Parts 1 and 2. Read it now!
π https://hubs.la/Q025N0lk0
π₯ [ tweet ]
In the third and final installment of our #blog series by @mega_spl0it @4ndr3W6S DACL-based detections are built, identifying attacks that focus on obscure or lesser-known AD Attributes that fall outside of the scope of Parts 1 and 2. Read it now!
π https://hubs.la/Q025N0lk0
π₯ [ tweet ]
π₯4π1
π [ TrustedSec @TrustedSec ]
In our new #blog post, Senior Security Consultant @n00py1 shows us why you don't need a drawer full of fancy tools to pivot through networksβjust some Windows #OpenSSH magic. Read it now!
π https://hubs.ly/Q02b_c620
π₯ [ tweet ]
In our new #blog post, Senior Security Consultant @n00py1 shows us why you don't need a drawer full of fancy tools to pivot through networksβjust some Windows #OpenSSH magic. Read it now!
π https://hubs.ly/Q02b_c620
π₯ [ tweet ]
π5π₯1
π [ TrustedSec @TrustedSec ]
Itβs time to get Groovy! In our new #blog, @__mez0__ goes over a variety of post-exploitation tasks in the #Groovy programming language for the next time youβre #enumerating a network. Read it now!
π https://hubs.la/Q02Vhm2G0
π₯ [ tweet ]
Itβs time to get Groovy! In our new #blog, @__mez0__ goes over a variety of post-exploitation tasks in the #Groovy programming language for the next time youβre #enumerating a network. Read it now!
π https://hubs.la/Q02Vhm2G0
π₯ [ tweet ]
π3
π [ TrustedSec @TrustedSec ]
In our new #blog, Senior Research Analyst @codewhisperer84 unveils his new tool DIT Explorer which he created after researching NTDS.dit files on Active Directory. Read part one of this series now to find out what this tool can do!
π https://trustedsec.com/blog/exploring-ntds-dit-part-1-cracking-the-surface-with-dit-explorer
π₯ [ tweet ]
In our new #blog, Senior Research Analyst @codewhisperer84 unveils his new tool DIT Explorer which he created after researching NTDS.dit files on Active Directory. Read part one of this series now to find out what this tool can do!
π https://trustedsec.com/blog/exploring-ntds-dit-part-1-cracking-the-surface-with-dit-explorer
π₯ [ tweet ]
π3π₯±3