I streamed Sunday and yesterday! Those VODs are up right now.
09.04.2025 16:11 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0@alh4zr3d.bsky.social
Legal Criminal | Twitch cult leader | InfosecPrep founder | Lovecraft scholar | Soros mercenary | Spiritual cargo shorts wearer | Cthulhu fhtagn
I streamed Sunday and yesterday! Those VODs are up right now.
09.04.2025 16:11 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0Twitch deletes VODs older than 60 days, unfortunately :(.
09.04.2025 15:56 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0Red Teamers: Some new tooling for shellcode injection in the presence of EDR, featuring a variety of injection techniques to include Early Cascade. I may look into this one on stream for a Tool Review.
github.com/0xsp-SRD/Zig...
Newbie Tuesday today @5 EDT!!!
twitch.tv/alh4zr3d
Another TrustedSec blog for this one, written by Christopher Paschen!
trustedsec.com/blog/abusing...
Red Teamers: Look into VPN settings in Windows. Can be applied from userland--transparent to all users--used to MITM network connections, blind EDR, etc!
Pwsh:
Add-VPNConnection -Name x -ServerAddress <domain>
Add-VPNConnectionRoute -ConnectionName "x" -DestinationPrefix "1.2.3.4/32"
For more info, check this awesome blogpost by TrustedSec:
trustedsec.com/blog/okta-fo...
Red Teamers: If your target is using Okta (check <orgname>.okta.com), pull a TGS for the SPN HTTP/<orgname>.kerberos.okta.com and inject it into your host session. When proxied, this will allow you to access their Okta dashboard.
Rubeus asktgs /spn:<spn>
Rubeus ptt /ticket:<ticket>
Completely successful first stream back today (even though I didn't do any hacking); resolved the mic issues and I'm ready for Newbie Tuesday!
RED TEAM TIPS START UP IN EARNEST TOMORROW
Long have you waited.
I return to streaming and content creation at large with a vengeance starting on Sunday, 6 April 2025.
Powered by the baddie you see below, revamped recording equipment/webcam, and more.
Expect me. Cthulhu fhtagn.
Red Teamers: do NOT neglect SNMP like sysadmins usually do! SO many networks have granted me very quick wins through SNMP enumeration, which can be done with Metasploit, snmpwalk, and onesixtyone:
Enum Windows accounts (spray?):
snmpwalk -c public -v1 $TARGET 1.3.6.1.4.1.77.1.2.25
#hacking #redteam
As a reminder, my "red team tips" found both on this and where I used to post them (the Nazi app) are not necessarily tips specifically for adversary emulators; they are generalized offensive tips useful to both penetration testers and red teamers. "Red team" is shorthand here!
24.01.2025 17:28 โ ๐ 7 ๐ 1 ๐ฌ 1 ๐ 0Hackers, give me good cybersecurity follows on this site. Who's made the jump from the Nazi site?
23.01.2025 21:26 โ ๐ 14 ๐ 1 ๐ฌ 2 ๐ 0I've been at home a grand total of two weeks since November; hard to stream when I'm gone that much I am afraid! Back to the grind next week, though!
23.01.2025 19:16 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0A screenshot of an email complaining about someone in the video game League of Legends sent to the Trump Administration's fascist anti-diversity email address
See, THIS is exactly the kind of unprofessional behavior that I do not condone.
23.01.2025 17:53 โ ๐ 5 ๐ 1 ๐ฌ 0 ๐ 0Hackers, the Trump Admin has set up a govt email at DEIATruth@opm.gov for people to report DEI workers and people who support diversity. Make sure that you do NOT drown it in garbage; that would be unprofessional.
And make sure you do NOT use services like 10minutemail.com to hide your identity!
Red Teamers, I'm starting off my bsky tips with a banger: using pending file change operations in the Registry to rename executables and indirectly disable AV/EDR!
If the EDR has tamper protection, make a junction to the EXE first!
Here's your PowerShell command: pastebin.com/Jikaicm1