Through consulting with several of our clients during IR engagements, we have discovered that several clients are taking steps to restrict and log PowerShell in their environment.
This blog will cover what redirectors are, why they are important for red teams, and how to automate their deployment with Ansible.
We are releasing the SecSmash tool we announced at BSIDES LV. SecSmash is a framework that allows you to turn centralized management,
Password cracking is a crucial part of a pentest. It can either lead you to the promised land, or stop you dead in your tracks.
When I came across the tool BloodHound, it quickly became one of the go-to tools in my arsenal.
As pentesters, our job is to demonstrate the risk of unpatched vulnerabilities to the business.
Responder is a go-to tool for most pentesters. We use it quite often on pentests to quickly gain access to a client’s domain.
This post will show how to crack NTLMv1 handshakes with the crack.
During a recent Red-Team engagement, we discovered a series of information disclosures on a site allowing our team to go from zero access to full compromise in a matter of hours.