Red Team Tips February 1st: OPSEC Safe Active Directory Enumeration with SilentHound

  Рет қаралды 1,651

Cyber Attack & Defense

Cyber Attack & Defense

Күн бұрын

Пікірлер: 18
@nickswink7983
@nickswink7983 Жыл бұрын
Hey I'm the developer, thanks for the walkthrough!
@nickswink7983
@nickswink7983 Жыл бұрын
One thing I would add is it supports pass-the-hash as well. So you don't need a plaintext password, and you can use just the NTLM hash if thats all you have
@CyberAttackDefense
@CyberAttackDefense Жыл бұрын
Nice thanks for the update!
@crash9706
@crash9706 Жыл бұрын
Wow, thanks for this content. This is very good stuff. Can we get some videos on how to setup red team infrastructure in the cloud maybe ? Also generally how to operate on a c2 in opsec way. What things to look for when first getting initial shell or beacon. I know I'm throwing a lot and it's very generic and wide space to cover. Thanks 👍
@CyberAttackDefense
@CyberAttackDefense Жыл бұрын
Great suggestion! I can slowly cover those topics over time!
@Clutchisback1PC
@Clutchisback1PC Жыл бұрын
This channel is effing gold...
@CyberAttackDefense
@CyberAttackDefense Жыл бұрын
Glad you are enjoying the content. Tell your friends!
@joyemoticon
@joyemoticon Жыл бұрын
Absolutely!
@almillar7280
@almillar7280 Жыл бұрын
legit is!!! Thanks so much CyberAttackDefence!!
@almillar7280
@almillar7280 Жыл бұрын
Is the query it runs signature-able? I suspect it probably not.a query many would consider as "normal" ldap traffic? Would it not just be more stealthy to enumerate the environment slowly using something like sharpview?
@CyberAttackDefense
@CyberAttackDefense Жыл бұрын
To be honest none of this is super stealthy. Not many orgs log LDAP queries. Sharpview depending on what you use would be less stealthy than this.
@almillar7280
@almillar7280 Жыл бұрын
Thanks for reply.... any ideas on how someone could enumerate AD with maximal stealth?
@maxrand6611
@maxrand6611 Жыл бұрын
Are there dependencies for the python script?
@CyberAttackDefense
@CyberAttackDefense Жыл бұрын
Yes there are dependencies. Do a pip3 -r requirement.txt for the silenthound.py
@joyemoticon
@joyemoticon Жыл бұрын
Thanks!
@CyberAttackDefense
@CyberAttackDefense Жыл бұрын
You bet!
@morinc75
@morinc75 Жыл бұрын
curious to see if this would trip up a honeypot account
@CyberAttackDefense
@CyberAttackDefense Жыл бұрын
If you point it at a honeypot it would trigger for sure. Redteams need to do their OPSEC enumeration. Typically honeypots will have some telltale signs.
Red Team Tips: How To Use Powershell Kerberos For Kerberos Abuse
8:00
Cyber Attack & Defense
Рет қаралды 1,8 М.
Red Team Tips: Updated PaloAlto XDR Bypass
16:34
Cyber Attack & Defense
Рет қаралды 6 М.
-5+3은 뭔가요? 📚 #shorts
0:19
5 분 Tricks
Рет қаралды 13 МЛН
Hide And Seek With Active Directory: Secrets For Persistence and Deception
12:32
Cyber Attack & Defense
Рет қаралды 1,6 М.
Why Are Arch Linux Users So TOXIC?
12:32
Eric Murphy
Рет қаралды 574 М.
Certipy and ADCSync attacks against Active Directory Certificate Services
22:22
Cyber Attack & Defense
Рет қаралды 3,5 М.
Arti - The Future Of The Dark Web
10:00
Mental Outlaw
Рет қаралды 118 М.
zoxide has forever improved the way I navigate in the terminal.
9:53
Dreams of Autonomy
Рет қаралды 485 М.
Active Directory Enumeration With Server Manager
19:49
HackerSploit
Рет қаралды 13 М.
Anti-forensics Techniques Used By Threat Actors In The Wild - Hela Lucas
44:35
Security BSides London
Рет қаралды 2,2 М.
-5+3은 뭔가요? 📚 #shorts
0:19
5 분 Tricks
Рет қаралды 13 МЛН