Persistence Techniques

Today I will talk about persistence, the technique used by adversaries to maintain their foothold on your network. It mainly consists of techniques used by adversaries to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Many tools are great for these techniques and I will demonstrate … Continue reading Persistence Techniques

Privilege Escalation

In today’s Episode of Red-Teaming we will talk about Privilege Escalation a valuable Technique when trying to gain higher privileges on a machine, we want to achieve this Goal because we want UNRESTRICTED access onto the machine we are targeting. In this part the APT is trying to gain higher privileges on the Machine There … Continue reading Privilege Escalation

Execution

In my previous post I talked about capturing hashes using a variety of different methods if you noticed these methods were utilizing LOLBAS also know as Living Off The Land Binaries and Scripts (and also Libraries) but what are these Executable that I utilized???. They are Windows Trusted Binaries that come installed into the System … Continue reading Execution

Capturing Hashes

So today I just wanted to write a simple post on explaining the method of Capturing Hashes (NTLM, NTLMv2, Etc). Let’s say we have access to a Victim machine but we are trying to Escalate our privileges, Maintain persistence or Execute Commands, various things can be done from here but I won’t dive too deep … Continue reading Capturing Hashes

Small Update

Well as of today in the current world’s situation. We are currently in Quarantine due to this Virus named COVID-19 (CoronaVirus). And I have been stuck at home just learning and reading the latest blogs and articles anything related to some Red Team Techniques, currently I met an individual with 20 years of experience in … Continue reading Small Update

Red Teaming

Well here it is, I am finally going for a Red Team Job (Jr) am I nervous? Yes…totally, was wondering how will I explain myself if I manage to ace this interview. I mean I have been studying the MITRE ATTACK Framework as it was the bible, created a gitbook page to demonstrate attacks and … Continue reading Red Teaming

2020

Wow it’s been a great amount of time since writing here, been really busy these last couple month’s on 2019. Interview’s, hacks, studying and moved onto the awesome field of Red-Team currently an Intern. So yeah… I’ve been doing a lot lately trying to catch up on these new attacks and new techniques for this … Continue reading 2020

DC-6 Walk-Through

And we made it people the last box of the series man what a ride learned a bunch with wordpress and other CMS, custom word-lists, enumeration and Burp awesome journey and was great to be part of this, this box was some work into it it all goes with experience but let’s move on with … Continue reading DC-6 Walk-Through

DC-5 Walk-Through

Another day!!, another box today I am working on DC-5 and it was great learned some awesome attacks and something so simple as “When All You Can Do Is Read” pretty informative give this one a google search, to sum this up it’s just, what would we do when all we can do is read … Continue reading DC-5 Walk-Through

DC-3 Walk-Through

Ok, ok let’s get into this this Machine was awesome really into this one I was having incredibly crazy trouble with my sql injection but after some researching we can find a tool named joomblah that will take care of this automatically also after attacking WordPress the past boxes this one moves to one called … Continue reading DC-3 Walk-Through