Red Team

43 Methods for Privilege Escalation

43 Methods for Privilege Escalation (Part 3)

Dump lsass with SilentProcessExit Domain: No Local Admin: Yes OS: Windows Type:  Enumeration & Hunting Methods:  SilentProcessExit.exe pid Lsass Shtinkering Domain: No Local Admin: Yes OS: Windows Type:  Enumeration & Hunting Methods:  HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps->2 LSASS_Shtinkering.exe pid AndrewSpecial Domain: No Local Admin: Yes OS: Windows Type:  Enumeration & Hunting Methods:  AndrewSpecial.exe CCACHE ticket reuse from …

43 Methods for Privilege Escalation (Part 3) Read More »

74 Methods For Privilege Escalation Part 2 (1)

74 Methods for Privilege Escalation(Part 2)

DirtyC0w Domain: No Local Admin: Yes OS: Linux Type:  0/1 Exploit Methods:  gcc -pthread c0w.c -o c0w; ./c0w; passwd; id CVE-2016-1531 Domain: No Local Admin: Yes OS: Linux Type:  0/1 Exploit Methods:  CVE-2016-1531.sh;id Polkit Domain: No Local Admin: Yes OS: Linux Type:  0/1 Exploit Methods:  1. 2. poc.sh DirtyPipe Domain: No Local Admin: Yes OS: …

74 Methods for Privilege Escalation(Part 2) Read More »

what is red team

What Is Red Team

As defined by the U.S. National Security Agency (NSA), a red team is an entity that specializes in breaking & entering, acquiring classified information, and leaving no trace behind. In the cyber realm, Red teams focus on penetration testing of different systems and their levels of security. They help detect, prevent, and eliminate weaknesses while …

What Is Red Team Read More »

Do you want quick & free cyber-security analysis of your application?

Secure your entire workforce, including remote employees.

TRY IT FREE

FOR 15 DAYS