Quick Note on Active Directory Attacks by Relaying and Spoofing

This post is just a quick note on how to obtain a foothold from zero in an Active Directory environment. The techniques being involved mainly MitM attack over IPv6 and NTLM relay attack. Please note that all below testings were conducted in an isolated lab environment, all unauthorized testing could be prosecuted. All attacks were initiated…

Cobalt Strike Quick Walkthrough

This is just a very rough and quick walkthrough to give some high-level insight into how Cobalt Strike could help in red-teaming exercises. Why use Cobalt Strike? commercial tool with maintenance and support the performance is stable very easy to deploy easy for team collaboration lots of community kit contributed by user community (https://cobalt-strike.github.io/community_kit/) Disclaimer…

Microsoft office 365 OAuth Phishing Demo

Microsoft Office 365 OAuth phishing (a.k.a. consent phishing) is on the rise. The compromised O365 accounts provide the attackers with access to victims’ emails, files, contacts, as well as sensitive information and resources stored on corporate SharePoint document management/storage systems and/or OneDrive for Business cloud storage spaces. This quick demo will illustrate how to setup O365 OAuth…

Basic Introduction of Shodan command-line interface

“Shodan is a search engine that lets the user find specific types of computers connected to the internet using a variety of filters.” It is a very useful tool for red team (conducting passive reconnaissance) and blue team (identifying potential exposed attack vectors). This post will try to provide some high level insight on how…

Some basic insight in attacking Active Directory

Recently, quite a number of cyber security incidents on the news related to the Active Directory attack, the below simple walk-through is aim to provide a basic technical insight on what the attackers may do in your organisation network in order to obtain high privilege or even domain admin rights. I hope this could provide…

Quick steps (to attempt) cracking encrypted PDF

First of all, why the title of this quick demo is so funny to include “to attempt”? It is because I would like to highlight the fact that the technical steps involved (in cracking) is simple, but, there are other success factors need to be considered: do you know if there is any pattern of…

Basic Pivoting By Using Metasploit

This is a very basic demo or tutorial (for beginner) on how to use Metasploit to conduct Pivoting. By referring to the definition of Pivoting from Offensive Security: In simple words, that is to use one exploited machine as a gateway to access other machines in the same network or other networks that you don’t…