What is Threat Intelligence? Threat intelligence is actionable knowledge and insight on adversaries and their malicious activities enabling defenders and their organizations to reduce harm through better security decision-making.Sergio Caltagirone Training: https://attack.mitre.org/resources/training/cti/
Meterpreter
Links: Proxy and Route
Protected: Black Box Pen Test 3
There is no excerpt because this is a protected post.
Books
Wish List The Art of Network Penetration TestingThe Modern Security Operations CenterHuman Hacking
SonicWall Switches
SonicOS 6.5.4.6 introduces support for all models of the SonicWall Switch. Links Product PageSonicWall Switch FAQsGetting Started GuideDeploy With High Availability UTM
Protected: Lab – Metasploit
There is no excerpt because this is a protected post.
Mimikatz
LSA Protection Bypass Check if LSA runs as a protected process. The variable for "RunAsPPL" will be set to 0x1 in HKLM\SYSTEM\CurrentControlSet\Control\Lsa. Upload mimidriver.sys from the mimikatz repo to the same folder as mimikatz.exe, then import. mimikatz # !+ Remove the protection flags from the lsass.exe process. mimikatz # !processprotect /process:lsass.exe /remove
SIP and Trust Provider Hijacking
ID: T1553.003 Description: Detects modifications to SIP and Trust Provider-related registry keys/values by a non-Administrator user. Links:https://attack.mitre.org/techniques/T1553/003/Red Teaming ExperimentsSpecterOps Subverting Trust in Windows
Password Cracking Demo
This is a recording based on a presentation I gave at the 2019 Cerdant Security Conference in Dublin, OH. Included in this presentation: Core Hash Cracking KnowledgeOverview of Cracking MethodologyLive Password Crack (Mask Attack)Pen Test Demonstration (DWVA & SQLMap) https://www.youtube.com/watch?v=3sk0q8WK2Ek&t=17s
Protected: Lab – Post Exploitation
There is no excerpt because this is a protected post.