home.social

#redteam — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #redteam, aggregated by home.social.

  1. 🍵 HTB Support Walkthrough 🍵

    Learn how to perform:
    - LDAP Enumeration
    - .NET Reverse Engineering
    - Bloodhound Enumeration
    - Resource Based Constraint Delegation

    🎬️Watch it here:
    youtube.com/watch?v=VIgskjoELo0

    #HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF

  2. 🍵 HTB Support Walkthrough 🍵

    Learn how to perform:
    - LDAP Enumeration
    - .NET Reverse Engineering
    - Bloodhound Enumeration
    - Resource Based Constraint Delegation

    🎬️Watch it here:
    youtube.com/watch?v=VIgskjoELo0

    #HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF

  3. 🍵 HTB Sauna Walkthrough 🍵

    Learn how to perform:
    - Username Enumeration
    - AS-REP Roasting
    - BloodHound Enumeration
    - DCSync Attack

    🎬️Watch it here:
    youtube.com/watch?v=WsBBGzcq0nI

    #HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF

  4. 🍵 HTB Sauna Walkthrough 🍵

    Learn how to perform:
    - Username Enumeration
    - AS-REP Roasting
    - BloodHound Enumeration
    - DCSync Attack

    🎬️Watch it here:
    youtube.com/watch?v=WsBBGzcq0nI

    #HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF

  5. ⚠️ Niveles de Transparencia en OSINT 🔥 https://www.reydes.com/e/Niveles_de_Transparencia_en_OSINT #cybersecurity #hacking #redteam #forensics #dfir #osint
  6. ⚠️ Registrar Todo en OSINT 🔥 https://www.reydes.com/e/Registrar_Todo_en_OSINT #cybersecurity #hacking #redteam #forensics #dfir #osint
  7. ⚠️ Como Documentar en OSINT 🔥 https://www.reydes.com/e/Como_Documentar_en_OSINT #cybersecurity #hacking #redteam #forensics #dfir #osint
  8. ⚠️ Importancia de las Anotaciones en OSINT (Parte II) 🔥 https://www.reydes.com/e/Importancia_de_las_Anotaciones_en_OSINT_Parte_II #cybersecurity #hacking #redteam #forensics #dfir #osint
  9. You need communication resilience and security. Security cannot be black box, platform and operating system needs to be in house. Crypto agility and geostationary routing. I think you need something way better.
    #comsec #opsec #resilience #redteam #satcom #dfir #outofband #preparedness

  10. Linux Privilege Escalation Cheat Sheet: Techniques and Prevention.

    In this cheat sheet, I break down essential enumeration commands, common escalation paths, and practical techniques every security professional should know.
    denizhalil.com/2025/06/30/linu

    #CyberSecurity #LinuxSecurity #PrivilegeEscalation #Pentesting #RedTeam #BlueTeam #InfoSec #ethicalhacking #SecurityEngineering #itsecurity

  11. New blog post!

    This time I talk about my new favorite evasive shellcode loader, Charon. I give a brief overview about what it does, how it works and which techniques it uses.

    Also a brief addendum for enjoyers of bloated Implants such as Sliver.

    ti-kallisti.com/general/ms/des

    #InfoSec #Malware #Shellcode #RedTeam #RedTeaming #Pentesting #Charon #Sliver #Merlin #Mythic

  12. UDP Network Monitoring with C++: A Comprehensive Guide

    In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
    denizhalil.com/2025/07/14/udp-

    #CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil

  13. UDP Network Monitoring with C++: A Comprehensive Guide

    In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
    denizhalil.com/2025/07/14/udp-

    #CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil

  14. UDP Network Monitoring with C++: A Comprehensive Guide

    In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
    denizhalil.com/2025/07/14/udp-

    #CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil

  15. 🚨 Most people think red teaming is about exploits.

    It’s not.

    The most effective attacks today don’t start with vulnerabilities —
    they start with **trust**.

    Modern environments are cloud-heavy, identity-driven, and full of SaaS integrations. In these systems, attackers don’t always need to “break in.”

    They move quietly through:

    • Over-permissioned identities
    • Weak approval workflows
    • Misconfigured cloud roles
    • OAuth tokens and API access
    • Human behavior under pressure
    • Business processes no one questions

    This is what I’ve been studying and calling the **Quiet Kill Chain** —
    a sequence of legitimate-looking actions that, when chained together, become an attack path.

    No loud exploits.
    No obvious malware.
    Just normal activity… used the wrong way.

    ## What changes at an advanced level?

    You stop asking:
    “What exploit should I use?”

    And start asking:

    • Where does this system trust too easily?
    • Which action would look completely normal?
    • What would defenders ignore?
    • How can I blend into business operations?

    Because the strongest intrusion today is not the one that is invisible.

    It’s the one that looks **legitimate**.

    ## My takeaway

    Offensive security is shifting from breaking systems
    to understanding them deeply enough to move inside them unnoticed.

    I’ve written a full deep-dive on this concept here 👇

    🔗 dev.to/blackcipher/the-quiet-k

    Curious to hear your thoughts —
    Is detection today ready for this level of subtlety?

    #CyberSecurity #RedTeam #OffensiveSecurity #ThreatIntel #CloudSecurity #IdentitySecurity #EthicalHacking #BlackCipher

  16. Python C2 Server for Red Teaming: A Comprehensive Hands-On Guide

    In this guide, I walk through building a Python-based C2 server, covering its architecture, encrypted communication, and real-world operational workflow.
    denizhalil.com/2025/12/15/pyth

    #CyberSecurity #RedTeam #C2 #commandandcontrol #Python #offensivesecurity #Pentesting #infosec #threatdetection #blueteam #securityengineering #ethicalhacking

  17. NoSQL Injection Attacks: MongoDB, CouchDB, and More – NoSQL injection

    In this article, I cover how NoSQL injection works, common attack vectors, and practical mitigation techniques.
    denizhalil.com/2025/12/23/nosq

    #CyberSecurity #NoSQL #MongoDB #CouchDB #WebSecurity #AppSec #Injection #InfoSec #Pentesting #RedTeam #BlueTeam #securecoding

  18. SSH Tunneling and Port Forwarding Techniques: A Comprehensive Guide

    In this article, I cover:
    * How SSH tunneling works under the hood
    * Local, remote, and dynamic port forwarding techniques
    * Real-world use cases (databases, internal services, pivoting)
    * Security risks and hardening recommendations

    denizhalil.com/2026/02/02/ssh-

    #CyberSecurity #sshtunneling #portforwarding #NetworkSecurity #Linux #RedTeam #BlueTeam #Pentesting #InfoSec #securityengineering #EthicalHacking #ITSecurity

  19. Subdomain Takeover Vulnerabilities and Prevention

    In this article, I cover:
    * How subdomain takeover vulnerabilities occur
    * Real-world exploitation scenarios
    Reconnaissance and detection techniques
    * Practical prevention and DNS hygiene strategies

    denizhalil.com/2026/02/16/subd

    #CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking

  20. Subdomain Takeover Vulnerabilities and Prevention

    In this article, I cover:
    * How subdomain takeover vulnerabilities occur
    * Real-world exploitation scenarios
    Reconnaissance and detection techniques
    * Practical prevention and DNS hygiene strategies

    denizhalil.com/2026/02/16/subd

    #CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking

  21. Subdomain Takeover Vulnerabilities and Prevention

    In this article, I cover:
    * How subdomain takeover vulnerabilities occur
    * Real-world exploitation scenarios
    Reconnaissance and detection techniques
    * Practical prevention and DNS hygiene strategies

    denizhalil.com/2026/02/16/subd

    #CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking

  22. What is DCSync Attack and Mimikatz Usage in Active Directory

    One of the most critical attacks in Active Directory environments, DCSync, allows attackers to impersonate a Domain Controller and extract password hashes through replication abuse.

    #CyberSecurity #ActiveDirectory #DCSync #RedTeam #BlueTeam #InfoSec #Pentesting #SOC #ThreatDetection #WindowsSecurity #EthicalHacking #ITSecurity #NetworkSecurity #SecurityOperations #DenizHalil

    denizhalil.com/2026/03/27/dcsy

  23. What is DCSync Attack and Mimikatz Usage in Active Directory

    One of the most critical attacks in Active Directory environments, DCSync, allows attackers to impersonate a Domain Controller and extract password hashes through replication abuse.

    #CyberSecurity #ActiveDirectory #DCSync #RedTeam #BlueTeam #InfoSec #Pentesting #SOC #ThreatDetection #WindowsSecurity #EthicalHacking #ITSecurity #NetworkSecurity #SecurityOperations #DenizHalil

    denizhalil.com/2026/03/27/dcsy

  24. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  25. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  26. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  27. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  28. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  29. Frameworks para testar IA e benchmark de Cyber Segurança

    Quer saber como testar uma IA e descobrir se ela é segura ou utilizável em Cyber Segurança? 🤖🛡️

    - Dois focos principais:
    • Testar a IA para encontrar vulnerabilidades no modelo (encontrar falhas, prompts que vazam ou comportamentos indesejados).
    • Fazer um benchmark para avaliar se essa IA pode ser usada na área de Cyber Segurança — especialmente...

    #IA #CyberSegurança #RedTeam #Vulnerabilidades #Benchmark #Segurança #MorningCrypto

  30. Frameworks para testar IA e benchmark de Cyber Segurança

    Quer saber como testar uma IA e descobrir se ela é segura ou utilizável em Cyber Segurança? 🤖🛡️

    - Dois focos principais:
    • Testar a IA para encontrar vulnerabilidades no modelo (encontrar falhas, prompts que vazam ou comportamentos indesejados).
    • Fazer um benchmark para avaliar se essa IA pode ser usada na área de Cyber Segurança — especialmente...

    #IA #CyberSegurança #RedTeam #Vulnerabilidades #Benchmark #Segurança #MorningCrypto

  31. A friend of mine got red teamed at work once. She left her workstation unlocked during the lunch break, and when she came back there as a slideshow in full screen saying "Your computer was hacked, don't touch anything and call the phone number below". Has something like this ever happened to you?

    #poll #security #infosec #RedTeam #PracticalJoke

  32. Everyone's making final updates for the initial release of @owasp Amass v5!

    Register and join our workshop at @defcon for additional details: lu.ma/hf83v61c

    #security #infosec #redteam #recon #osint #attacksurface @defconowasp

  33. Everyone's making final updates for the initial release of @owasp Amass v5!

    Register and join our workshop at @defcon for additional details: lu.ma/hf83v61c

    #security #infosec #redteam #recon #osint #attacksurface @defconowasp

  34. Everyone's making final updates for the initial release of @owasp Amass v5!

    Register and join our workshop at @defcon for additional details: lu.ma/hf83v61c

    #security #infosec #redteam #recon #osint #attacksurface @defconowasp