Hey I'm the developer, thanks for the walkthrough!
@nickswink7983 Жыл бұрын
One thing I would add is it supports pass-the-hash as well. So you don't need a plaintext password, and you can use just the NTLM hash if thats all you have
@CyberAttackDefense Жыл бұрын
Nice thanks for the update!
@crash9706 Жыл бұрын
Wow, thanks for this content. This is very good stuff. Can we get some videos on how to setup red team infrastructure in the cloud maybe ? Also generally how to operate on a c2 in opsec way. What things to look for when first getting initial shell or beacon. I know I'm throwing a lot and it's very generic and wide space to cover. Thanks 👍
@CyberAttackDefense Жыл бұрын
Great suggestion! I can slowly cover those topics over time!
@Clutchisback1PC Жыл бұрын
This channel is effing gold...
@CyberAttackDefense Жыл бұрын
Glad you are enjoying the content. Tell your friends!
@joyemoticon Жыл бұрын
Absolutely!
@almillar7280 Жыл бұрын
legit is!!! Thanks so much CyberAttackDefence!!
@almillar7280 Жыл бұрын
Is the query it runs signature-able? I suspect it probably not.a query many would consider as "normal" ldap traffic? Would it not just be more stealthy to enumerate the environment slowly using something like sharpview?
@CyberAttackDefense Жыл бұрын
To be honest none of this is super stealthy. Not many orgs log LDAP queries. Sharpview depending on what you use would be less stealthy than this.
@almillar7280 Жыл бұрын
Thanks for reply.... any ideas on how someone could enumerate AD with maximal stealth?
@maxrand6611 Жыл бұрын
Are there dependencies for the python script?
@CyberAttackDefense Жыл бұрын
Yes there are dependencies. Do a pip3 -r requirement.txt for the silenthound.py
@joyemoticon Жыл бұрын
Thanks!
@CyberAttackDefense Жыл бұрын
You bet!
@morinc75 Жыл бұрын
curious to see if this would trip up a honeypot account
@CyberAttackDefense Жыл бұрын
If you point it at a honeypot it would trigger for sure. Redteams need to do their OPSEC enumeration. Typically honeypots will have some telltale signs.