HackDig : Dig high-quality web security articles for hackers

Red Teaming: How to Run Effective Cyber-Drills?

What is red teaming? How is it different from conventional penetration testing? Why do we need blue, red, and white teams? How are cyber-drills carried out, and what results should be expected? In this article, we will answer these and other questions related to red teaming.What is Red Teaming?The red team attacks, the blue team defends. The simple rules of
Publish At:2020-02-28 00:43 | Read:354 | Comments:0 | Tags:Vulnerability Management Blue Team pentest Red Team

Red Teaming for Blue Teamers: A Practical Approach Using Open Source Tools

For the majority of people in the information security world, the act of offensive hacking is something they are tasked with protecting against but have little ability to do themselves. That is like asking a professional boxer to enter the ring without knowing how to throw a punch. Sure, you may be able to get in and last a few rounds, but eventually, a form
Publish At:2020-02-19 00:33 | Read:421 | Comments:0 | Tags:Events Blue Team Red Team RSA

The importance of logs: You won’t see what you don’t log

Presentation on logging and auditing strategies (as given at Secure South West 11). Building on my blog post on Cisco’s security blog entitled The Importance of Logs, I put together a presentation that picks apart some of the practical aspects of building a successful logging capability focusing on the need to document “good” and curate 
Publish At:2019-09-19 17:35 | Read:770 | Comments:0 | Tags:Presentations blue team hardening red team SecureSouthWest t

Where 2 worlds collide: Bringing Mimikatz et al to UNIX

Presentation on Active Directory integration solutions for UNIX (as given at Black Hat Europe 2018). Over the past fifteen years there’s been an uptick in “interesting” UNIX infrastructures being integrated into customers’ existing AD forests. Whilst the threat models enabled by this should be quite familiar to anyone securing a heter
Publish At:2019-09-19 17:35 | Read:919 | Comments:0 | Tags:Presentations analysis auditing Black Hat Europe blue team c

An offensive introduction to Active Directory on UNIX

By way of an introduction to our talk at Black Hat Europe, Security Advisory EMEAR would like to share the background on our recent research into some common Active Directory integration solutions. Just as with Windows, these solutions can be utilized to join UNIX infrastructure to enterprises’ Active Directory forests. Background to Active Directory i
Publish At:2019-09-19 17:35 | Read:1035 | Comments:0 | Tags:Blog analysis auditing Black Hat Europe blue team conference

Reverse port forwarding SOCKS proxy via HTTP proxy (part 1)

In the context of a Red Team assessment, in this post I’ll look at some options for using SOCKS to gain external access to an internal network. I’ll cover the obvious methods and why I’m overlooking them, a crude method using standard tools (this post) and a more refined approach using modified tools (in part 2). I recently spent quite a lo
Publish At:2019-09-19 17:35 | Read:1061 | Comments:0 | Tags:Blog RDP red team Windows

Five Attributes of an Effective Corporate Red Team

By Daniel Miessler and Ryan O'HoroAfter talking recently with colleagues at IOActive as well as some heads of industry-leading red teams, we wanted to share a list of attributes that we believe are key to any effective Red Team.[ NOTE: For debate about the relevant terminology, we suggest Daniel's post titled The Difference Between Red, Blue, and
Publish At:2016-11-19 20:15 | Read:3077 | Comments:0 | Tags:adversary emulation daniel meissler ioactive organizational

Pentest Toolbox Additions 2016

I’ve added some handy tools to my pentest toolbox this year. You’ll find a short description of each with links to more information below. Whether red or blue team, you’ll want to know what these tools can do.Password SprayingPassword spraying is guessing a few passwords against a large list of users in order to avoid account lockout. You w
Publish At:2016-11-08 16:05 | Read:4918 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Blue Team

Cyber Security: Red Team, Blue Team and Purple Team

In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious rivals and/or enemies to the “regular” forces, the Blue Team. Whenever we discuss Information Security from a defensive point of view, we are inclined to think about protection, damage control, and reaction. However, adopting an at
Publish At:2016-07-23 04:40 | Read:4963 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Blue Team Information Wa


Share high-quality web security related articles with you:)


Tag Cloud