assume-breachHome-Grown Red Team: Local Admin Phishing For Privilege and PersistenceHi all! In my last post, we explored a hardened, but also not hardened enough to actually be officially called hardened by the only person…Mar 62Mar 62
assume-breachHome-Grown Red Team: Taking On A Hardened Windows SystemWARNING: This post has been deemed misinformation by the author of the script used throughout to harden the system.There is only one person…Mar 31Mar 31
assume-breachHome Grown Red Team: Adding Icons To Windows Based Executables Compiled In LinuxHi all! So, today we’re going to go over something that I haven’t seen anywhere else. This isn’t some super secret task, but when I went to…Feb 51Feb 51
assume-breachI’m Not A Pentester (And You Might Not Want To Be One Either) Part 2 : The ResponseOkay, so obviously this thing blew up. I really wasn’t expecting it to go this way but I figured I should probably do some kind of…Jan 3113Jan 3113
assume-breachHome Grown Red Team: LNK Phishing In 2023 Revisited…AgainWelcome back. So, it’s been about a week since I published my post on LNK phishing. A few days after publishing, I was testing some other…Oct 13, 20231Oct 13, 20231
assume-breachHome Grown Red Team: LNK Phishing Revisited In 2023All right so macros are out, ISOs, zips and password protected zips are all getting flagged. What’s an APT to do? Well, LNK files are still…Oct 3, 20231Oct 3, 20231
assume-breachHome Grown Red Team: The Offensive Clipboard RevisitedThis isn’t going to be a long post, but I think it’s a really cool concept that I have wanted to implement for a while. This isn’t a new…Sep 1, 2023Sep 1, 2023
assume-breachHome Grown Red Team: Hak5 Gear In 2023 With Microsoft Defender For EndpointWelcome back! Today we’ll take a look at some of the tools out there by Hak5. If you’re not familiar with Hak5, they are a company that…Aug 29, 2023Aug 29, 2023