Red Team Posted on March 20, 2014 (November 29, 2022) User Account Control – What Penetration Testers Should Know UAC is User Account Control. Introduced in Windows Vista, UAC is a collection of technologies that make it convenient possible to use Windows without administrator Read More
Red Team Posted on March 4, 2014 (May 3, 2022) CCDC Red Teams: Ten Tips to Maximize Success The CCDC season is upon us. This is the time of year when professionals with many years of industry experience “volunteer” to hack against college Read More
Red Team Posted on February 20, 2014 (May 3, 2022) What took so long? (A little product philosophy) Cobalt Strike’s January 8, 2014 release generates executables that evade many anti-virus products. This is probably one of the most requested features for Cobalt Strike. Given the Read More
Red Team Posted on February 5, 2014 (May 3, 2022) Why I give all of my training material away—for free I’m the developer of a commercial penetration testing product, Cobalt Strike. People are often amazed that I have a free 9-part Penetration Testing course on Read More
Red Team Posted on January 21, 2014 (September 26, 2022) Obituary: Java Self-Signed Applet (Age: 1.7u51) The Java Signed Applet Attack is a staple social engineering option. This attack presents the user with a signed Java Applet. If the user allows Read More
Red Team Posted on January 14, 2014 (May 3, 2022) Cloud-based Redirectors for Distributed Hacking A common trait among persistent attackers is their distributed infrastructure. A serious attacker doesn’t use one system to launch attacks and catch shells from. Rather, Read More
Red Team Posted on November 9, 2013 (May 3, 2022) Schtasks Persistence with PowerShell One Liners One of my favorite Metasploit Framework modules is psh_web_delivery. You can find it in exploits -> windows -> misc. This module starts a local web Read More
Red Team Posted on October 18, 2013 (April 26, 2023) Tradecraft – Red Team Operations Course and Notes A few days ago, I posted the YouTube playlist on Twitter and it’s made a few rounds. That’s great. This blog post properly introduces the Read More
Red Team Posted on October 3, 2013 (May 3, 2022) Email Delivery – What Pen Testers Should Know I get a lot of questions about spear phishing. There’s a common myth that it’s easy to phish. Start a local mail server and have your hacking Read More
Red Team Posted on September 19, 2013 (May 3, 2022) What’s in a Team Server? Clients (like Armitage) interface with the Metasploit Framework through its Remote API. The Remote API is a way for clients to call functions in the Read More