Intro Ever wondered how adversaries move from zero domain access to domain admin ??? As a Penetration Tester / Red Team Operator I’ve been doing exactly that For the past 3 years. starting from basic recon and escalating all the way to domain/enterpr...
Enumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...
Reconnaissance First, we start with a full port scan to verify all possible open ports. ─[us-dedivip-1]─[10.10.16.200]─[jpfguedes@htb]─[~/htb/Seal] └──╼ [★]$ sudo nmap -v -sS -Pn -p- 10.10.10.250 PORT STATE SERVICE 22/tcp open ssh 443/tcp op...
Published on Wednesday, July 12, 2023 REDTEAM: Embracing Adversarial Tactics for Ironclad Security 🎯🚫 ===================================================================== Authors Name Elon Tusk 😄 Twitter What is REDTEAM? 💻 REDTEAMing involve...
Published on Sunday, June 25, 2023 REDTEAM: Embracing Adversarial Tactics for Ironclad Security 🎯🚫 ===================================================================== Authors Name Eric deQuevedo 😄 Twitter What is REDTEAM? 💻 REDTEAMing invol...