shafique wastaforBreachForcebreachforce.net·Dec 10, 2023Data Exfiltration Via Text StorageScenarios Introduction During red team activities, there may be instances where you encounter limitations on downloading and uploading from your laptop due to the presence of web proxies and Data Loss Prevention (DLP) measures. At times, DLP systems ...1 like·195 readsAssumed Breach Odyssey: Red Team UnleashedDLP-Bypass
Rushikesh PatilforBreachForcebreachforce.net·Dec 8, 2023Red Teaming: The Art of Active Directory EnumerationIntroduction : In the ever-evolving landscape of cybersecurity, red teaming has emerged as a pivotal practice for organizations seeking to fortify their defenses against potential threats. Among the arsenal of techniques employed during red team asse...2 likes·1.0K readsAssumed Breach Odyssey: Red Team Unleashedredteaming
Rushikesh PatilforBreachForcebreachforce.net·Dec 2, 2023Assumed Breach: The Red Teamer's Toolkit, Client Pre-Requisites & Initial AccessIntroduction: Hello, fellow cybersecurity enthusiasts! Today, we're delving into the world of Red Team Engagements – a simulated cybersecurity challenge where ethical hacking takes center stage. Our journey begins with a look at the essential startin...1 like·139 readsAssumed Breach Odyssey: Red Team Unleashedpentesting
Rushikesh PatilforBreachForcebreachforce.net·Sep 9, 2023Cracking the TGT: A Deep Dive into Kerberoasting AttackIntroduction - In today's world of computers and the internet, keeping important information safe and making sure no one can access your data are really important for companies. One big part of making sure everything is secure is protecting the way y...2 likes·166 readsAssumed Breach Odyssey: Red Team Unleashedpentesting