When we launch continuous penetration testing in a new network, we don't want to raise suspicion of our presence.
For one reason, we may be able to get credentials without doing anything intrusive at all.
To do it, we use packet captures and some external tooling. Below, we’ll break down how to do it, along with a few of our favorite...
Resources
Blog
Blog
Keep up to date with the latest offensive security news, knowledge, and resources.
In this article I show you how to create small containers that use up to date tools. By default, the Golang Docker container at its smallest is 123 MB. While seemingly small, this can result in annoying latency and slowness when deploying new tooling at scale...
In part 2 we go beyond autossh and create a OpenVPN server that our dropboxes and pentesters will connect to. We'll walk through configurations and certificates needed for seamless connectivity.
The MITRE CALDERA project is an automated adversary emulation system. It's primary purpose is to execute a series of operations to help determine if adversarial tactics can be detected in your enterprise environment.
This is the start of a series I'm calling Autored. My goal is to quickly stand up temporary systems I commonly use during an engagement. In this post I'll cover how to deploy an Empire server in AWS in less than 3 minutes from the command line.