Rahmat Nurfauzi
@infosecn1nja
Security Researcher/Red/Purple Teaming/Adversary Simulation/Threat Hunter. Contributors of Atomic Red Team, PS Empire, ATT&CK Framework, LOLBas, and more.
ID:713707985470513152
https://github.com/infosecn1nja 26-03-2016 12:43:38
3,0K Tweets
2,5K Followers
1,3K Following
'Hello: I'm your Domain Administrator and I want to authenticate against you'. My #SilverPotato is out, check the blog post: decoder.cloud/2024/04/24/hel… 😃
🪲And the 2023 Year in Review of Zero-Days Exploited In-the-Wild is out!
This year I teamed up with Jared Semrau & James from Mandiant to write a joint report combining our expertise and providing a more holistic view on in-the-wild 0-days in 2023 🔥🧐
blog.google/technology/saf…
New blog post is up... Identity Providers for RedTeamers. This follows my #SOCON2024 talk, and provides the technicals behind the presentation, looking at other IdP's and what techniques are effective beyond Okta. blog.xpnsec.com/identity-provi…
Interested in sharpening your red team AD recon? Check out our latest post by Dominic Chell 👻, 'Active Directory Enumeration for Red Teams' mdsec.co.uk/2024/02/active…
SOAPHound is out for walkies!
SOAPHound is a #BloodHound collector to enumerate AD over SOAP instead of LDAP directly.
Proud of Nikos for all his hard work!
Blog: medium.com/falconforce/so…
Tool repo: github.com/FalconForceTea…
Detections:
github.com/FalconForceTea…
I'm exited to release GraphStrike, a project I completed during my internship at Red Siege Information Security. Route all of your Cobalt Strike HTTPS traffic through graph.microsoft.com.
Tool: github.com/RedSiege/Graph…
Dev blog: redsiege.com/blog/2024/01/g…
#redteam #infosec #Malware #Microsoft
With initial access to a M365 account, Red Teamers can potentially find a treasure trove of sensitive information. Melvin langvik goes over three tools (and one script) that he believes to be the modern-day Triforce for initial access. Read it now on our blog! hubs.la/Q0281CvN0
Happy Monday! Today Darkoperator | 🇺🇦 and I are releasing a blog on adversarial LDAP tradecraft.
In this write-up we show:
- Normal LDAP queries you might see
- Common LDAP queries adversaries and red teams use
- Telemetry you can use to see these LDAP queries
- A way to get