Adversaries Are Doing Stranger Things Part 2

  Рет қаралды 872

Cyber Attack & Defense

Cyber Attack & Defense

Күн бұрын

Пікірлер: 15
@MrVik24
@MrVik24 2 ай бұрын
Great video! Thank you
@CyberAttackDefense
@CyberAttackDefense 2 ай бұрын
Glad you liked it!
@harshil.
@harshil. 3 ай бұрын
Love this series!
@CyberAttackDefense
@CyberAttackDefense 3 ай бұрын
Thanks! I think these techniques aren't emulated enough by Red/Purple Teams so I want to make sure people know they exist.
@ohmsohmsohms
@ohmsohmsohms 3 ай бұрын
Thank you a bunch for this series, im a newb when it comes to red teaming and you've been helping a bunch on my journey, will edit the comment after i've watched :D Loved the video. Very interesting version of memprocfs, I used the tool once and had to resort to the pypykatz module. Since you showed it's possible I will try to tweak it!
@CyberAttackDefense
@CyberAttackDefense 3 ай бұрын
Glad you enjoyed it. Thanks for watching!
@UsamaAli-kr2cw
@UsamaAli-kr2cw 3 ай бұрын
MindBlowing Content as always. Only thing is bothering me that memory dump size can be huge if our target systems are windows servers so how we will be able to exfiltrate that huge file without detection and evading dlp?
@CyberAttackDefense
@CyberAttackDefense 3 ай бұрын
That’s the catch with this technique. Now if your rules of engagement allow software installation. You could cut it up with memprocfs on box and exfil just the minidump.
@UsamaAli-kr2cw
@UsamaAli-kr2cw 3 ай бұрын
@@CyberAttackDefense Cool. thanksalot sir ❤️❤️❤️❤️
@BEAST4LIF3
@BEAST4LIF3 3 ай бұрын
Do you happen to have a way for winpmem to be able to write to a remote location? Also why you gotta flex the custom memprocfs like that..... Sending me on a mission this weekend.
@CyberAttackDefense
@CyberAttackDefense 3 ай бұрын
I don't have a way to do this specifically however using any ram capture works. Velociraptor or remote forensics collection utilities can collect ram remotely.
@BEAST4LIF3
@BEAST4LIF3 3 ай бұрын
@@CyberAttackDefense makes sense thank you!
Adversaries Are Doing Stranger Things Part 3
22:35
Cyber Attack & Defense
Рет қаралды 899
Adversaries Are Doing Stranger Things Part 1
21:20
Cyber Attack & Defense
Рет қаралды 1,5 М.
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 31 МЛН
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
Quando eu quero Sushi (sem desperdiçar) 🍣
00:26
Los Wagners
Рет қаралды 15 МЛН
Red Team Tips: How To Use Powershell Kerberos For Kerberos Abuse
8:00
Cyber Attack & Defense
Рет қаралды 1,8 М.
Hide And Seek With Active Directory: Secrets For Persistence and Deception
12:32
Cyber Attack & Defense
Рет қаралды 1,5 М.
CYDEF Technology and Demo
13:18
CYDEF
Рет қаралды 47
Kerberoasting: The Art Of Cyber Deception
9:02
Cyber Attack & Defense
Рет қаралды 685
LSASS Dumping Using DFIR Tools
11:32
Cyber Attack & Defense
Рет қаралды 2,3 М.
Deceptive Cyber Tactics: Deceiving Responder
19:45
Cyber Attack & Defense
Рет қаралды 801
Lets Go Around Defender with NativeDump
11:56
Cyber Attack & Defense
Рет қаралды 989
Microsoft Dev Tunnels for C2, Persistance and RDP Redirection
4:20
Cyber Attack & Defense
Рет қаралды 2,1 М.
Bypassing Defender and AMSI with NukeAMSI
6:50
Cyber Attack & Defense
Рет қаралды 1,3 М.
Windows Defender Got You Down? Try No-Defender!
4:19
Cyber Attack & Defense
Рет қаралды 1,9 М.
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 31 МЛН