Category: ZeroSec – Adventures In Information Security

BYODC – Bring Your Own Domain Controller

BYODC or bring your own domain controller is a post-exploitation technique and another option for performing a DCSync in a more opsec safe manner. This article has been indexed from ZeroSec – Adventures In Information Security Read the original article:…

Multiple Paths to Compromise An Environment

Attack paths and compromising systems are something we, as attackers, thrive in. Many areas of system weakness can be attacked and leveraged to gain a foothold or an upper hand within an environment. This article has been indexed from ZeroSec…

Multiple Paths to Compromise An Environment

Attack paths and compromising systems are something we, as attackers, thrive in. Many areas of system weakness can be attacked and leveraged to gain a foothold or an upper hand within an environment. This article has been indexed from ZeroSec…

ZTH-CH4: Hook & Sling – Phishing For Gold

To this date, phishing is one of the most prevalent first stages of entry to an organisation, a lot of threat actors This article has been indexed from ZeroSec – Adventures In Information Security Read the original article: ZTH-CH4: Hook…

ZTH-CH4: Hook & Sling – Phishing For Gold

To this date, phishing is one of the most prevalent first stages of entry to an organisation, a lot of threat actors This article has been indexed from ZeroSec – Adventures In Information Security Read the original article: ZTH-CH4: Hook…

HoneyPoC is Dead – Long Live Disinformation

This short blog post explains what each tool does and overviews the use/reason for the release. Release of AutoPoC and SandboxSpy. This article has been indexed from ZeroSec – Adventures In Information Security Read the original article: HoneyPoC is Dead…

HoneyPoC is Dead – Long Live Disinformation

This short blog post explains what each tool does and overviews the use/reason for the release. Release of AutoPoC and SandboxSpy. This article has been indexed from ZeroSec – Adventures In Information Security Read the original article: HoneyPoC is Dead…

Free Audi MMI Maps and Speedcams Update 2022/2023

Update Audi Maps and Speedcams for free; files and steps are included for Maps 2022/2023. All without the need for OBDeleven or VCDS. This article has been indexed from ZeroSec – Adventures In Information Security Read the original article: Free…

Azure Attack Paths: Common Findings and Fixes (Part 1)

This article has been indexed from ZeroSec – Adventures In Information Security This post will walk through various services within the Azure catalogue and look at potential attack paths. Read the original article: Azure Attack Paths: Common Findings and Fixes…

Chasing the Silver Petit Potam to Domain Admin

This article has been indexed from ZeroSec – Adventures In Information Security Exploiting Petit Potam in a different way to force some downgrade and protocol attacks. Read the original article: Chasing the Silver Petit Potam to Domain Admin

Chasing the Silver Petit Potam

This article has been indexed from ZeroSec – Adventures In Information Security Exploiting Petit Potam in a different way to force some downgrade and protocol attacks. Read the original article: Chasing the Silver Petit Potam

A Minor Update – No Blog Posts for a While!

This article has been indexed from ZeroSec – Adventures In Information Security Readers of ZSEC and my Twitter feed, A quick message/explanation. I have published my last two blog posts for a while as I am working on my second…

2021 – Looking Back on a Great Year

This article has been indexed from ZeroSec – Adventures In Information Security I have made it somewhat of a tradition to look back at the previous 12 months in a blog post on the last day of the year or…

Tunnelling For Offensive Security

This article has been indexed from ZeroSec – Adventures In Information Security One thing that comes up a lot when it comes to red teaming, penetration testing and breaching a network is being able to proxy traffic into multiple environments.…

AutoPoC – Validating the Lack of Validation in PoCs

This article has been indexed from ZeroSec – Adventures In Information Security HoneyPoC was a project to look at how popular CVE PoCs could be. AutoPoC took that concept and enabled the mass creation of disinformation. Also, Data is beautiful.…

LTR102 – Teaser

This article has been indexed from ZeroSec – Adventures In Information Security I started writing LTR102 a while ago but have decided to release a teaser chapter of the new book for free for folks to check out and feedback…

ADExplorer Exporting Quick Tip

This article has been indexed from ZeroSec – Adventures In Information Security Working with ADExplorer as a Red Teamer is really useful for seeing the whole domain in a single snapshot that can be looked at offline. There is minimal…

Ford Focus RS (Potentially For Sale)

This article has been indexed from ZeroSec – Adventures In Information Security Thinking about selling my Mk3 Focus RS in Nitrous Blue, the spec sheet and modifications are listed below, get in touch on twitter if you're interested @ZephrFish. Focus…

Understanding Cobalt Strike Profiles

This article has been indexed from ZeroSec – Adventures In Information Security A deep dive into specifics around cobalt strike malleable c2 profiles and key information that is new in cobalt strike 4.4. Read the original article: Understanding Cobalt Strike…

Some of the [Many] Problems with Security Skills

This article has been indexed from ZeroSec – Adventures In Information Security Some of the problems with Security/Infosec/Insert whatever you want to call this industry here and the discussion around skills shortage plus realisation that the expectation vs reality on…

Ford Focus RS (Potentially For Sale)

This article has been indexed from ZeroSec – Adventures In Information Security Thinking about selling my Mk3 Focus RS in Nitrous Blue, the spec sheet and modifications are listed below, get in touch on twitter if you're interested @ZephrFish. Focus…

Locking Down SSH – The Right Way

This article has been indexed from ZeroSec – Adventures In Information Security A little guide for locking down a VPS or similar to ensure your SSH connection is as secure as can be. Read the original article: Locking Down SSH…

Social Profiling – OSINT for Red/Blue

This article has been indexed from ZeroSec – Adventures In Information Security One of the areas that I love when it comes to red/purple engagements is profiling organizations on LinkedIn and GitHub, looking for crucial information that can lead to…

Old but Gold – Attack and Defend the Sys Admins

Read the original article: Old but Gold – Attack and Defend the Sys Admins Older techniques used in a sysadmin space, weaponised for red teaming and how to detect them from a blue team perspective.   Become a supporter of…

Old but Gold – Attack and Defend the Sys Admins

Read the original article: Old but Gold – Attack and Defend the Sys Admins Older techniques used in a sysadmin space, weaponised for red teaming and how to detect them from a blue team perspective.   Become a supporter of…

Reviving and Refactoring DNS Enum

Read the original article: Reviving and Refactoring DNS Enum I have been using Lepus for a number of years as it is one of the better subdomain enumeration tools. I integrated some of the lessons learned from DNS Queue and…

Pass the Way to DA

Read the original article: Pass the Way to DA Pass the X attacks originate from having a piece of information, in these examples this will be a hash, a set of credentials or a Kerberos ticket and then leveraging them…

Pass the Way to DA

Read the original article: Pass the Way to DA Pass the X attacks originate from having a piece of information, in these examples this will be a hash, a set of credentials or a Kerberos ticket and then leveraging them…

2020 – A year of Ups and Downs

Read the original article: 2020 – A year of Ups and Downs This year has been interesting to say the least, a lot has happened and it has been full of great moments but equally upsetting and downer moments.  …

ZeroLogon(CVE-2020-1472) – Attacking & Defending

Read the original article: ZeroLogon(CVE-2020-1472) – Attacking & Defending A handy walkthrough of CVE-2020-1472 from both a red and blue team perspective, how to detect, patch and hack ZeroLogon   Advertise on IT Security News. Read the original article: ZeroLogon(CVE-2020-1472)…

Developing An Effective Security Program

Read the original article: Developing An Effective Security Program This post comes off the back of a series of tweets I made one morning, I decided that after a long thread it was probably better to combine into one post.…

Developing An Effective Security Program

Read the original article: Developing An Effective Security Program This post comes off the back of a series of tweets I made one morning, I decided that after a long thread it was probably better to combine into one post.…

WTF is Rainbow Teaming?

Read the original article: WTF is Rainbow Teaming? Alternative Title: 50 Shades of Teams Red Team, Blue Team, Purple Team, Black Team… Rainbow team? What are all of these things and what do they all mean? Is this a new…

WTF is Rainbow Teaming?

Read the original article: WTF is Rainbow Teaming? Alternative Title: 50 Shades of Teams Red Team, Blue Team, Purple Team, Black Team… Rainbow team? What are all of these things and what do they all mean? Is this a new…

WeegieCast is Progressing

Read the original article: WeegieCast is Progressing David Manuel and Andy Gill present WeegieCast 100% NSFW with some episodes. We’ve made it to 12 episodes so far go check them out https://blog.zsec.uk/dave-andys-weegiecast/ We have a few more guests lined up…

Hack The Box Struggle Throughs

Read the original article: Hack The Box Struggle Throughs I’ve been streaming on twitch and uploading to YouTube shortly afterward, therefore here are the first two episodes, I’ll update this post as and when I do more machines!   Advertise…