<502edbb8> So a meme running through the community is ‘Are all these super dank open source red team tools really good for infosec or just making blue’s team harder?’ <502edbb8> Nearly all the APTs (doesn’t count the US) use them in their kill chain <502edbb8> And it appears like the past 3-4 have seen a […]
<502edbb8> <https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html?te=1&amp;nl=the-privacy%20project&amp;emc=edit_priv_20191219?campaign_id=0&amp;instance_id=0&amp;segment_id=0&amp;user_id=7c8ff3fc774920a57c39e5d6cb28327e&amp;regi_id=020191219>
<502edbb8> Ill seed this chan with a few articles to get the juices flowin <502edbb8> <https://pastebin.com/8rXhtqgr> <502edbb8> <http://www.harmj0y.net/blog/powershell/command-and-control-using-active-directory/> bending c2c around all network boundaries.\ <502edbb8> harmj0y is one of the best AD pen testers around (that publishes at least) <502edbb8> It’s a brilliant use of AD for c2 <502edbb8> <https://www.dallashackers.com/> &lt;— local dallas clique if […]