<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Yaksas Security: Red Team Training]]></title><description><![CDATA[A dedicated space for courses published by Yaksas Security]]></description><link>https://www.yaksas.com/s/courses</link><image><url>https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png</url><title>Yaksas Security: Red Team Training</title><link>https://www.yaksas.com/s/courses</link></image><generator>Substack</generator><lastBuildDate>Sat, 02 May 2026 04:50:50 GMT</lastBuildDate><atom:link href="https://www.yaksas.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Yaksas Security]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[yaksas@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[yaksas@substack.com]]></itunes:email><itunes:name><![CDATA[Yaksas Security]]></itunes:name></itunes:owner><itunes:author><![CDATA[Yaksas Security]]></itunes:author><googleplay:owner><![CDATA[yaksas@substack.com]]></googleplay:owner><googleplay:email><![CDATA[yaksas@substack.com]]></googleplay:email><googleplay:author><![CDATA[Yaksas Security]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[PoshC2: A Red Teamer's Notes]]></title><description><![CDATA[A quick reference guide for using PoshC2, a post-exploitation framework, during penetration testing and red teaming engagements.]]></description><link>https://www.yaksas.com/p/poshc2-a-red-teamers-notes</link><guid isPermaLink="false">https://www.yaksas.com/p/poshc2-a-red-teamers-notes</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 11:08:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9aac3cc3-8bac-4c12-a8c3-93a0e4e29f28_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is an ongoing post containing my notes on PoshC2 usage.</p><h4>What is PoshC2?</h4><p><a href="https://github.com/nettitude/PoshC2">PoshC2</a> is a command and control software. It is used to carry out post-exploitation tasks such as persistence, privilege escalation, lateral movements etc. during penetration testing and red teaming exercises. It supports Python3, PowerShell (v2 and v5), C# and C++. The official documentation is available <a href="https://poshc2.readthedocs.io/en/latest/">here</a>.</p><p>All of PoshC2 functionality can be divided into five components:</p><p><strong>PoshC2 Server</strong> - Serves payloads that can be executed on target machine(s) and send a connection back to PoshC2. The server console also displays the output of command(s) executed on an implant. The server is written in Python.</p><p><strong>Implants Receiver</strong> - Listens for the incoming implant connections and aggregates them. It is also used to load modules and execute commands on a single, multiple or all implants.</p><p><strong>Payloads</strong> - Commands, shellcode, executable binaries that when executed on target machine(s) (aka implants) sends back a connection to Implant receiver. Payloads are developed using C#, Python, PowerShell, JavaScript, VBScript and support Windows, Linux (Python) and MacOS (Python).</p><p><strong>Implants - </strong>Target machine(s) connected to PoshC2.</p><p><strong>Modules - </strong>Scripts (PowerShell and Python) and executable binaries (C#) that help in conducting various post-exploitation tasks such as enumeration, privilege escalation, lateral movement, hash dump, port forwarding etc. A comprehensive list of modules is available <a href="https://github.com/nettitude/PoshC2/tree/master/resources/modules">here</a>.</p><h4>How to use?</h4><p>The following video shows how to get PoshC2 up and running quickly. It covers:</p><ul><li><p>Installation on Kali Linux 2020.2</p></li><li><p>Configuring PoshC2</p></li><li><p>Running Posh-server and implants receiver</p></li><li><p>Managing implants</p></li><li><p>Modules</p></li><li><p>Loading C# and PowerShell modules on an Implant</p></li><li><p>Running commands on an implant</p></li></ul><p>Read <a href="https://yaksas.in/ycscblog/purple-ad-active-directory-lab-environment/">this</a> to learn more about the lab environment used in this video.<br></p><h4>Useful Commands (C# Implants)</h4><p><strong>Selecting Implant(s)<br></strong></p><ul><li><p>To select a single implant, enter the ImplantID</p></li><li><p>To select multiple implants, enter a comma separated list of ImplantIDs</p></li><li><p>To select all implants, enter ALL</p></li></ul><p><strong>Quick Reference List of Commands</strong></p><p>Issue the following command when connected to an implant(s)</p><pre><code>help</code></pre><p><strong>Bypass AMSI</strong></p><pre><code>bypass-amsi</code></pre><p><strong>Upload files</strong></p><pre><code>upload-file &lt;source file path&gt; &lt;destination file path&gt;
Example: upload-file /usr/share/windows-binaries/nc.exe C:\Users\Public\nc.exe</code></pre><p><strong>Download files</strong></p><pre><code>download-file &lt;file path&gt;
Example: download-file 'C:\\Users\\Public\\supersecretdata.txt'</code></pre><p>This will save a copy of the target file in the PoshC2 project directory.</p><p><strong>List Modules</strong></p><p>To list implant specific modules, select an implant and issue the following command:</p><pre><code> listmodules</code></pre><p>To list all modules, issue the following command at implant selection prompt:</p><pre><code>listmodules</code></pre><p><strong>Load a C# Module</strong></p><pre><code>loadmodule &lt;module name&gt;
Example: loadmodule SharpView.exe</code></pre><p><strong>Load a PowerShell Module</strong></p><pre><code>pslo &lt;module name&gt; 
Example: pslo powerview.ps1</code></pre><p>You can also use loadmoduleforce to load modules.</p><p><strong>Execute a PowerShell Command</strong></p><pre><code>sharpps &lt;command&gt; 
Example: sharpps Get-ChildItem -Force -Recurse</code></pre><p><strong>Convert Username and Password to a PSCredentials object</strong></p><pre><code>sharpps [string]$userName = 'IND\user.ind02'
sharpps [string]$userPassword = 'Sup3rStr0ngP@ssw0rd'
sharpps [securestring]$secStringPassword = ConvertTo-SecureString $userPassword -AsPlainText -Force
sharpps [pscredential]$credObject = New-Object System.Management.Automation.PSCredential ($userName, $secStringPassword)</code></pre><p>After executing above commands, $credObject can be passed as a value to -Credential parameter in PowerShell commands which accept this parameter.</p><p><strong>Enumerate an Implant</strong></p><pre><code>ls-recurse &lt;directory path&gt;
Example:  ls-recurse C:\Users
get-userinfo
get-computerinfo
loadmodule Seatbelt.exe
seatbelt all
sharpup</code></pre><p><strong>Port Scan</strong></p><pre><code>portscan &lt;IP&gt; &lt;port&gt; &lt;delay-in-seconds&gt; &lt;max thread&gt;
Example: portscan "192.168.3.8" "1-1000" 1 100</code></pre>]]></content:encoded></item><item><title><![CDATA[The Three Command and Control Tiers]]></title><description><![CDATA[This post covers the three command and control tiers commonly used during red team and adversary emulation engagements.]]></description><link>https://www.yaksas.com/p/the-three-command-and-control-tiers</link><guid isPermaLink="false">https://www.yaksas.com/p/the-three-command-and-control-tiers</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 11:02:05 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dc99a628-691b-45d3-a5fd-cd4c20cec5b4_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post is part of our course <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE">Adversary Emulation 101: Mimicking a real-world cyber attack</a>.</p><p>A well designed Command and Control (C2) infrastructure is critical to the success of an <a href="https://yaksas.in/ycscblog/what-is-adversary-emulation/">adversary emulation</a> exercise. During an engagement, established C2 sessions may get disconnected frequently. Whenever this happens, there might be a temptation to re-exploit the target and establish another C2 session. This is not only time consuming but also not recommended during an active engagement. For one, it can put the entire engagement at risk as re-exploitation may lead to unwanted consequences. To avoid this, C2 mechanisms are deployed in a layered (or tiered) manner.</p><h2>What are the three Command and Control tiers?</h2><p>C2 mechanisms are generally deployed into following three tiers:</p><ul><li><p><strong>Interactive</strong> - C2 mechanisms in this tier are used more frequently than others. They are primarily used for issuing commands, enumeration, scanning and data exfiltration. The callback time is usually within minutes. For example, C2 agents deployed on target machines.</p></li><li><p><strong>Short-Haul</strong> - C2 mechanisms in this tier are used to re-establish interactive mechanisms. The callback time is within 12-24 hours. For example, a cronjob that downloads the C2 agent and executes it every 12 hours.</p></li><li><p><strong>Long-Haul</strong>&nbsp; - C2 mechanisms in this tier are used to re-establish short-haul mechanisms. The callback time is 24 hours or more. This is the slowest mechanism of all three and should not be used for interactive purposes. For example, a start-up script to create the cronjob mentioned before.</p></li></ul><h2>What to keep in mind while deploying multiple C2 tiers?</h2><ul><li><p>Use a tier for it's intended purpose only. For example, a short-haul C2 mechanism should not be used to run commands interactively.</p></li><li><p>Use different C2 channels (HTTPS, DNS, SSH, SMB etc.) for different tiers. This will ensure that even if one channel gets blocked an alternate is available to use.</p></li><li><p>Use encryption to avoid detection via network security devices.</p></li><li><p>Minimize C2 callback volume wherever possible. This will help in avoiding unnecessary exposure.</p></li><li><p>Avoid dropping binaries on target machines as this may trigger the anti-malware solution and alert the Blue team.</p></li></ul><h3>Other posts in this series</h3><ul><li><p><a href="https://yaksas.com/p/what-is-adversary-emulation">What is adversary emulation?</a></p></li><li><p><a href="https://yaksas.com/p/red-team-operations-attack-lifecycle">Red Team Operations Attack Lifecycle</a></p></li><li><p><a href="https://yaksas.com/p/introduction-to-mitre-att-and-ck">Introduction to MITRE ATT&amp;CK Framework</a></p></li><li><p><a href="https://yaksas.in/ycscblog/poshc2-a-red-teamers-notes/">PoshC2: A Red Teamer&#8217;s Notes</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Introduction to MITRE ATT&CK Framework]]></title><description><![CDATA[This post covers basics of MITRE ATT&CK framework. One of the use cases of ATT&CK is Adversary Emulation exercises.]]></description><link>https://www.yaksas.com/p/introduction-to-mitre-att-and-ck</link><guid isPermaLink="false">https://www.yaksas.com/p/introduction-to-mitre-att-and-ck</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 10:55:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8806ef74-cc2a-47c6-ae3a-94694c5e6c69_800x258.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post is part of our course <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE">Red Team Adversary Emulation: Mimicking a real-world cyber attack</a>.</p><p>If you want to beat your adversaries, think like them. A common adage we have all heard. <a href="https://attack.mitre.org">MITRE ATT&amp;CK</a> is just that. A framework to think like adversaries and beat them in their game. It is a culmination of years of efforts of studying various cyber Adversaries' Tactics, Techniques and turning them into Common Knowledge (ATT&amp;CK).</p><h2>What is ATT&amp;CK framework?</h2><p>As per <a href="https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf">ATT&amp;CK's design and philosophy document</a>, ATT&amp;CK is a behavioral model that consists of the following core components:</p><ul><li><p>Tactics, denoting short-term, tactical adversary goals during an attack;</p></li><li><p>Techniques, describing the means by which adversaries achieve tactical goals;</p></li><li><p>Sub-techniques, describing more specific means by which adversaries achieve tactical goals at a lower level than techniques;</p></li><li><p>Documented adversary usage of techniques, their procedures,and other metadata;</p></li><li><p>Software, used by adversaries to implement a technique or a sub-technique; and</p></li><li><p>Mitigations, preventing adversaries from achieving their tactical goal by blocking the execution of a technique or a sub-technique.</p></li></ul><p>The following figure will help in understanding the relationship between various ATT&amp;CK components.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n6wA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n6wA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 424w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 848w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 1272w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n6wA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png" width="1024" height="790" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:790,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;MITRE ATT&amp;CK Object Model&quot;,&quot;title&quot;:&quot;MITRE ATT&amp;CK Object Model&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="MITRE ATT&amp;CK Object Model" title="MITRE ATT&amp;CK Object Model" srcset="https://substackcdn.com/image/fetch/$s_!n6wA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 424w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 848w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 1272w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: ATT&amp;CK Design and Philosophy Paper (page 27)</figcaption></figure></div><h2>Why was ATT&amp;CK created?</h2><p>MITRE's goal behind creating this framework was to improve post-compromise detection of threats by tracing out the steps that could have been taken by an adversary. It was born out of the need to categorize adversary behavior as part of conducting adversary emulation exercises within MITRE&#8217;s Fort Meade Experiment (FMX) research environment.</p><h2>What does it contain?</h2><p>There are three variants of ATT&amp;CK framework:</p><ul><li><p><a href="https://attack.mitre.org/matrices/enterprise/">Enterprise</a></p></li><li><p><a href="https://attack.mitre.org/matrices/mobile/">Mobile</a></p></li><li><p><a href="https://collaborate.mitre.org/attackics">ICS (Industrial Control Systems)</a></p></li></ul><p>Originally, the Enterprise variant focused only on Microsoft Windows. However, later it was expanded to include macOS, Linux, PRE, AWS, GCP, Azure, Azure AD, Office 365, SaaS, Network platforms as well.</p><p>Each variant contains various tactics, techniques, sub-techniques and procedures that could be used by an adversary. The best way to visualize the framework is <a href="https://mitre-attack.github.io/attack-navigator/">ATT&amp;CK Navigator</a>. It is an interactive web application, through which you can create layered views of the framework, as per your requirement.</p><h2>Use cases</h2><p>ATT&amp;CK can be used for various purposes, such as:</p><ul><li><p><a href="https://yaksas.in/ycscblog/what-is-adversary-emulation/">Adversary emulation</a></p></li><li><p>Red teaming</p></li><li><p>SOC assessments</p></li><li><p>Defensive gap assessments</p></li><li><p>Behavioral analytics development</p></li><li><p>Cyber threat intelligence enrichment</p></li></ul><p>MITRE provides an excellent <a href="https://www.mitre.org/sites/default/files/publications/mitre-getting-started-with-attack-october-2019.pdf">getting started guide</a> that shows how to utilize ATT&amp;CK framework for these use cases.</p>]]></content:encoded></item><item><title><![CDATA[What is Adversary Emulation?]]></title><description><![CDATA[Learn about adversary emulation. This post is part of our course Red Team Adversary Emulation: Mimicking a real-world cyber attack]]></description><link>https://www.yaksas.com/p/what-is-adversary-emulation</link><guid isPermaLink="false">https://www.yaksas.com/p/what-is-adversary-emulation</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 10:51:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fc18c476-18db-4ec3-9b29-96126f0d72ec_768x414.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post is part of our course <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE">Red Team Adversary Emulation: Mimicking a real-world cyber attack</a>.</p><p>Adversary Emulation is a form of cybersecurity assessment. During this assessment assessors replicate a specific threat scenario. For example, assessors may assume the role of cyber criminals who want to exfiltrate customer data out of the organization. Another scenario could be assessors trying to infect the organization's software product(s) and mimic a supply chain attack.</p><h2>How to perform Adversary Emulation?</h2><p>These exercises are performed by red teams. The responsibility of defending lies with blue teams. Usually an attack methodology is created or followed to conduct these exercise. This can be in form of a process, such <a href="https://yaksas.in/ycscblog/red-team-operations-attack-lifecycle">Red Team Operations Attack Lifecycle</a>. Or well defined attack plans such as <a href="https://attack.mitre.org/resources/adversary-emulation-plans/">MITRE Adversary Emulation Plans</a>. Cyber threat intelligence sources also play a key role during this exercise. They often serve as a starting point for most exercises.</p><h2>Benefits</h2><p>The aim of this exercise is to see how the organization's defenses will fare in the event of a real cyber attack. Such exercises are helpful in identifying vulnerabilities missed during other assessments (such as penetration testing) as such assessments are usually limited in scope and attack surface. For example, <a href="https://www.zdnet.com/article/cybersecurity-how-facebooks-red-team-is-pushing-boundaries-to-keep-your-data-safe/">Facebook is leveraging adversary emulation</a> to protect their infrastructure from sophisticated attacks.</p><p>Featured Image Source: <a href="https://www.freepik.com/vectors/technology">Freepik</a></p>]]></content:encoded></item><item><title><![CDATA[Red Team Operations Attack Lifecycle]]></title><description><![CDATA[The nine-step process of conducting red team and adversary emulation exercises.]]></description><link>https://www.yaksas.com/p/red-team-operations-attack-lifecycle</link><guid isPermaLink="false">https://www.yaksas.com/p/red-team-operations-attack-lifecycle</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 10:44:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/603e557e-bb04-4190-9fc6-06735d31f27c_2560x2560.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P2qt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P2qt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 424w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 848w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P2qt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg" width="1024" height="407" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:407,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!P2qt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 424w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 848w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This post is part of our course <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE">Adversary Emulation 101: Mimicking a real-world cyber attack</a>.</p><p>The lifecycle consisted of following phases, with phases 3-6 being cyclic in nature:</p><ol><li><p><strong>Recon (Information Gathering) </strong>&#8211; In this phase, publicly available information (website, company profile, social media pages, employee profiles etc.) is gathered about the target organization.</p></li><li><p><strong>Initial Compromise (Foothold) </strong>&#8211; In this phase, information from Recon phase is analysed to identify and exploit a vulnerability or launch a phishing attack that helps in establishing a foothold within the target network.</p></li><li><p><strong>Privilege Escalation </strong>- In this phase, the attacker attempts to escalate privileges to an administrator (Windows) or root (Linux) account on the compromised host. Usually, this is done each time a new host is compromised.</p></li><li><p><strong>Establishing Persistence </strong>&#8211; In this phase, the attacker installs a persistence mechanism (usually a Command and Control (C2) agent) to maintain presence in the target network. This enables the attacker to communicate with compromised hosts without having to exploit it again in case the original connection dies out. Usually, this is done each time a new host is compromised.</p></li><li><p><strong>Internal Recon </strong>&#8211; In this phase, the attacker leverages the compromised host to gather information about the internal network. Usually, this is done each time a new host is compromised and is thought to have access to more resources. For example, if an attacker compromises an Active Directory domain joined machine, they can use that machine to enumerate the Active Directory network.</p></li><li><p><strong>Lateral Movement </strong>&#8211; In this phase, the attacker tries to expand their access by compromising new hosts within the target network. The information collected during Internal Recon phase is leveraged here.</p></li><li><p><strong>Data Analysis </strong>&#8211; As new hosts are compromised, the attacker scans each of them for interesting information (employee records, financial statements, PII, credit card information, customer databases etc.).</p></li><li><p><strong>Exfiltration </strong>&#8211; Anything that the attacker deems useful is pulled out and downloaded onto the attacker machine (or their chosen location).</p></li><li><p><strong>Deleting footprints </strong>&#8211; Once the attacker has achieved their objective, they delete all files, logs, emails etc. created by them during the exercise to hide their presence.</p></li></ol>]]></content:encoded></item><item><title><![CDATA[Immunity Debugger for Exploit Devs]]></title><description><![CDATA[Learn Immunity Debugger in and out. You will learn both, well-known and lesser-known, features.]]></description><link>https://www.yaksas.com/p/immunity-debugger-for-exploit-devs</link><guid isPermaLink="false">https://www.yaksas.com/p/immunity-debugger-for-exploit-devs</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 22 Sep 2024 05:16:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Lhg5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Immunity Debugger is powerful when it comes to writing exploits, analyzing malware and reverse engineering binary files. It is the debugger of choice for most security professionals. It has a rich user interface with function graphing and a heap analysis tool built specifically for heap creation. It is shipped with Python API for easy extensibility.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lhg5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lhg5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Lhg5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Lhg5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Lhg5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lhg5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg" width="705" height="397" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:397,&quot;width&quot;:705,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:40716,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lhg5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Lhg5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Lhg5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Lhg5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ab1c65-195d-49a1-baa8-404115f49598_705x397.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This course covers Immunity Debugger in and out. You will learn both, well-known and lesser-known, features. A few topics taught in this course are as follows:</p><pre><code><code>Download and Installation
Views
Stack Operations
Disassembler Operations
Breakpoints, stepping through, tracing etc.
PyCommands and Mona Library
Just-in-time debugging
... and a lot more
</code></code></pre><p>Immunity Debugger is extremly useful while creating exploits, backdooring PE files, encoding binaries to evade anti-malware software. Therefore, a good understanding of this tool is must for security professionals, specially for people studying for security certifications from Offensive Security (OSCP, OSCE, OSED etc.), eLearnSecurity (ePTP, ePTX etc.) and various other organizations.</p><p>I have created this course with the vision that it becomes your go to reference guide for Immunity Debugger and other similar debuggers (Ollydbg, Evans debugger etc).</p><p>This is a FREE course and you can <a href="https://courses.yaksas.in/p/immunity-debugger-for-exploit-devs-ycsc-lab-essentials">enrol here</a>.</p><h3>Who this course is for:</h3><pre><code><code>- Cyber security professionals
- Reverse Engineers
- Beginners in Exploit Development
- Security Researchers / Engineers/ Analysts
</code></code></pre><h3>What you&#8217;ll learn</h3><pre><code><code>- Basics of Immunity Debugger
- Get familiar with various Views / Windows
- Stack operations available in Immunity Debugger
- Disassembler operations available in Immunity Debugger
- Get started with PyCommands &amp; Mona Library
- Just-in-time debugging with Immunity Debugger
- How to set breakpoints, step through and trace
- Immunity Debugger command line
</code></code></pre><h3>Requirements</h3><pre><code><code>- Familiarity with Assembly Language (good to have)
- Understanding of x86 CPU architecture (registers, flags, stack etc.)
</code></code></pre><p>Note: This website is not associated or owned by Immunity Inc. Immunity Debugger logo is a copyright of Immunity Inc. and is used here for representational purposes only.</p>]]></content:encoded></item><item><title><![CDATA[Red Team Adversary Emulation Lab - Tax First Labz ]]></title><description><![CDATA[Red team lab to go along with the course Red Team Adversary Emulation (https://yks.red/RTAE)]]></description><link>https://www.yaksas.com/p/red-team-adversary-emulation-lab</link><guid isPermaLink="false">https://www.yaksas.com/p/red-team-adversary-emulation-lab</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sat, 21 Sep 2024 05:01:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!z9ar!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://taxfirstlabz.xyz">Tax First Labz (TFL)</a> is a rising name in the world of FinTech startups. Started in 2017 by two college friends, their customer base has grown at a rapid scale in the last two years. Recently, they noticed some unusual activity in their network and suspect that their might be something fishy going on. In order to speed up their investigation, they decided to crowd-source the issue to the cybersecurity community.</p><p>This lab is part of the course <a href="https://adversaryemulation.com/">Red Team Adversary Emulation</a> by <a href="https://yaksas.in">Yaksas CSC</a>. In this course, you will look at an organization&#8217;s security from a real-world adversary perspective. You are hired by a FinTech startup, Tax First Labz (http://taxfirstlabz.xyz) to conduct an adversary emulation exercise and steal their customer data (before an actual adversary). This exercise assumes zero knowledge about the target network.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!z9ar!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!z9ar!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png 424w, https://substackcdn.com/image/fetch/$s_!z9ar!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png 848w, https://substackcdn.com/image/fetch/$s_!z9ar!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png 1272w, https://substackcdn.com/image/fetch/$s_!z9ar!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!z9ar!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png" width="621" height="401" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:401,&quot;width&quot;:621,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:34394,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!z9ar!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png 424w, https://substackcdn.com/image/fetch/$s_!z9ar!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png 848w, https://substackcdn.com/image/fetch/$s_!z9ar!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png 1272w, https://substackcdn.com/image/fetch/$s_!z9ar!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1cd861c-52f7-431d-b9b4-44f638c83ad8_621x401.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>n this lab, you will mimic a real world cyber attack with a specific objective, stealing Tax Fist Labz customer data. You will follow the Red Team Operations Attack Lifecycle to conduct this exercise. You will go through each phase in a step-by-step manner and build our attack path as you move ahead. You will employee a variety of techniques, such as</p><ul><li><p>Active and passive information gathering</p></li><li><p>Weaponizing an exploit</p></li><li><p>Internal reconnaissance</p></li><li><p>Brute-forcing Exchange server via custom username and password lists</p></li><li><p>Spear phishing a senior employee</p></li><li><p>Privilege Escalation (Linux and Windows)</p></li><li><p>Automated Active Directory domain enumeration</p></li><li><p>Persistence via command and control center</p></li><li><p>Active Directory attacks</p></li><li><p>Pivoting</p></li><li><p>Data Exfilteration</p></li></ul><p>This is a beginner friendly course and lab. If you have just started your career in offensive cybersecurity or are preparing for penetration testing exams (OSCP, eJPT, eCPT, eCPTx, CRTP, CRTO etc.) then this course is for you. If you are already a penetration tester or a red teamer, you will enjoy following a live adversary emulation exercise from scope creation to reporting.</p><h2>Lab access (self-hosted)</h2><p>If you want to hack the Tax First Labz network, you can do so by hosting the lab network in your own AWS account. To check self-hosting prerequisites and eligibility please fill the form below. Once the instructor approves, you will be provided access to <a href="https://aksh.one">AKSH</a>, our lab management bot on <a href="https://yks.red/discord">Discord</a>. You can ask <a href="https://aksh.one">AKSH </a>to automatically deploy / destroy the lab environment in your AWS account, list machines, check lab status, start, stop, reboot and revert machines.</p><p>We do not charge anything for self-hosted labs. However, you will have to pay AWS charges for hosting the lab network. The charges are approximately USD 0.38 per hour when the lab is running and approximately USD 0.033 per hour when the lab is stopped. The amount will be charged by Amazon on the credit card you have configured for billing in your AWS account. Charges will be incurred until you destroy the lab environment. Check the &#8216;Lab Setup&#8217; section of the course for more details.</p><p>Once the lab has been deployed, you will be provided access to a pre-configured attacker machine (Kali Linux) via browser-based interface (Apache Guacamole). This machine contains all tools required to attack the target organization and exfiltrate the data.</p><p><a href="https://yks.red/RTAELabForm">Red Team Adversary Emulation Lab - Self-hosting Prerequisites and Eligibility Form</a></p><div id="youtube2-yRFK8DZDfX0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yRFK8DZDfX0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yRFK8DZDfX0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Why opt for self-hosted version?</h2><p>Here are few reasons we think you will enjoy the self-hosted lab:</p><ul><li><p>You have full-control of the lab. Through our lab management bot, AKSH, you will be able to start and stop the lab as per your convenience. AKSH can do a lot more (check Lab Management via AKSH video in the lab setup section).</p></li><li><p>You can reverse engineer the lab setup and understand how to create an red team lab on AWS.</p></li><li><p>There&#8217;s no time limit. You will have access to the lab network as long as you want.</p></li><li><p>It&#8217;s free (in the sense that you don&#8217;t have to pay anything to us). You only pay AWS charges ($0.38 / hour when running and $0.033 / hour when stopped).</p></li></ul><h2>Lab FAQs</h2><p>Lab FAQs are available <a href="https://yaksas.com/p/red-team-adversary-emulation-lab-164">here</a></p><h2>Support</h2><p>Lab support will be provided via Discord. Please join <a href="https://ykrt.in/discord">Yaksas Security Discord server</a>.</p>]]></content:encoded></item><item><title><![CDATA[Red Team Adversary Emulation Course]]></title><description><![CDATA[In this course, you will look at an organization&#8217;s security from a real-world adversary perspective]]></description><link>https://www.yaksas.com/p/red-team-adversary-emulation-course</link><guid isPermaLink="false">https://www.yaksas.com/p/red-team-adversary-emulation-course</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Fri, 20 Sep 2024 07:51:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/wAonnM-AkQE" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this course, you will look at an organization&#8217;s security from a real-world adversary perspective. You are hired by a FinTech startup, Tax First Labz (http://taxfirstlabz.xyz) to conduct an adversary emulation exercise and steal their customer data (before an actual adversary). This exercise will assume zero knowledge about the target network.</p><p>During this adversary emulation exercise you mimic a real world cyber attack with a specific objective, stealing Tax Fist Labz customer data. You will follow the Red Team Operations Attack Lifecycle to conduct this exercise. You will go through each phase in a step-by-step manner and build our attack path as you move ahead. You will employee a variety of techniques, such as</p><pre><code><code>- Active and passive information gathering
- Weaponizing an exploit
- Internal reconnaissance
- Brute-forcing via custom username and password lists
- Spear phishing a senior employee
- Privilege Escalation (Linux and Windows)
- Automated Active Directory domain enumeration
- Persistence via command and control center
- Active Directory attacks
</code></code></pre><p>to achieve your objective. Upon completion of the exercise, you will prepare and submit a report to the organization&#8217;s management.</p><p>Through this course you will learn how to use tools such as, PoshC2, Mentalist, BloodHound, Mimikatz, Metasploit, PowerUp, icacls, PowerShell etc.</p><p>This is a beginner friendly course. If you have just started your career in offensive cybersecurity or are preparing for penetration testing exams (OSCP, eJPT, eCPT, eCPTx, CRTP etc.) then this course is for you. If you are already a penetration tester or a red teamer, you will enjoy following a live adversary emulation exercise from scope creation to reporting.</p><h2>Course introduction</h2><div id="youtube2-wAonnM-AkQE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;wAonnM-AkQE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/wAonnM-AkQE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>What you&#8217;ll learn</h2><pre><code><code>- How to plan and manage adversary emulation exercise
- Difference between red teaming and adversary emulation
- MITRE ATT&amp;CK Framework
- Red team operations attack lifecycle
- How to conduct adversary emulation exercise on a real-world organization
- Open Source Intelligence (OSINT) techniques to gather information
- Weaponizing exploits to gain foothold into the network
- Password brute-forcing using custom username and password lists
- Spear phishing a senior employee
- Escalating Privileges on Linux and Windows systems
- Active Directory enumeration using BloodHound
- Active Directory attacks
- Establishing persistence via PoshC2 (command and control center software)
- Creating an engagement report</code></code></pre><h2>Requirements</h2><pre><code><code>- Basic knowledge of Kali Linux
- Basic knowledge of PowerShell
- Basic understanding of penetration testing and red teaming
- Curious mind</code></code></pre><h2>Who this course is for</h2><pre><code><code>- OSCP, eCPPT, eCPTX, CRTE aspirants
- Penetration testers, red teamers, offensive cyber security professionals
- Professionals seeking a deeper understanding of real-world cyber attacks
- Executives seeking to understand how an organization can be breached</code></code></pre><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE&quot;,&quot;text&quot;:&quot;Enroll in the course&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE"><span>Enroll in the course</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://yaksas.com/p/red-team-adversary-emulation-lab&quot;,&quot;text&quot;:&quot;Course Lab&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://yaksas.com/p/red-team-adversary-emulation-lab"><span>Course Lab</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Capture the flag - Tax First Labz]]></title><description><![CDATA[Capture the flag lab for the course Red Team Adversary Emulation.]]></description><link>https://www.yaksas.com/p/capture-the-flag-tax-first-labz</link><guid isPermaLink="false">https://www.yaksas.com/p/capture-the-flag-tax-first-labz</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Fri, 20 Sep 2024 07:48:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://taxfirstlabz.xyz">Tax First Labz (TFL) </a>is a rising name in the world of FinTech startups. Started in 2017 by two college friends, their customer base has grown at a rapid scale in the last two years. Recently, they noticed some unusual activity on their webserver and suspect that their might be something fishy going on with their website. In order to speed up their investigation, they decided to crowd-source the issue to the cybersecurity community.</p><p>Here&#8217;s a replica of their webserver, your aim is to find as many vulnerabilities as you can and ultimately pwn the root user.</p><p><a href="https://yks.red/TFLWSPROD">Tax First Labs Website (Production)</a></p><h2>How to get started?</h2><ol><li><p>Download the VM from the above link and extract the Zip file.</p></li><li><p>Import / Open OVF with VMWare Player or VMWare Workstation or VirtualBox</p></li><li><p>Run the VM</p></li><li><p>The VM is configured to run over a host-only network and obtains the IP address automatically via DHCP. You will need to discover the IP address of the machine by using a network scanning tool, such as nmap.</p></li><li><p>Once you have discovered the IP address, note it down for the next step.</p></li><li><p>To access the Tax Firt Labz website (http://taxfirstlabz.xyz) create the following entry in the /etc/hosts file on your attacking machine (Kali Linux, Parrot OS etc.): <br><code>&lt;IP address discovered in step 4&gt; taxfirstlabz.xyz</code></p></li></ol><h2>Rewards</h2><p>Tax First Labs has hidden a few surprise gifts within this machine as a reward for your efforts. First 10 users to pwn root will earn a special reward (don&#8217;t forget to check flag.txt).</p><h2>How to get a free enrollment in Red Team Adversary Emulation course?</h2><ol><li><p>Solve this CTF</p></li><li><p>Create a write-up and share it.</p></li><li><p>Tag Yaksas CSC when you share your write-up.</p></li><li><p>Everyone who posts a write-up will get a free course pass.</p></li><li><p>Successful participants will be listed in hall of fame and their write-ups will be featured on https://adversaryemulation.com</p></li></ol><h2>How to enter the Hall of fame?</h2><p>Just tweet us at @yaksas443 once you have pwned either the user or root.</p><h2>Hall of fame</h2><ul><li><p><strong>User blood</strong>: Mickhat</p></li><li><p><strong>System blood</strong>: Mickhat</p></li><li><p><strong>User owns</strong>: 8</p></li><li><p><strong>Root owns</strong>: 8</p></li></ul><h3>First 10 people to pwn this machine</h3><ul><li><p>Mickhat</p></li><li><p>ARINJOY MANNA</p></li><li><p>Lucas Jos&#233; Rodrigu&#234;s da Silva</p></li><li><p>Himanshu</p></li><li><p>Arron</p></li><li><p>Mattia Campagnano</p></li><li><p>Aman Kumar Maurya</p></li><li><p>Cyb3r Cen</p></li></ul><h2>Support</h2><p>Tweet us at @yaksassecurity or join our <a href="https://discord.gg/q6y5VM2PbA">discord channel</a>.</p><p>Happy hacking!</p>]]></content:encoded></item><item><title><![CDATA[Buy Courses]]></title><description><![CDATA[Buy courses at https://courses.yaksas.in]]></description><link>https://www.yaksas.com/p/buy-courses</link><guid isPermaLink="false">https://www.yaksas.com/p/buy-courses</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Fri, 20 Sep 2024 07:42:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c31cfb22-d8b7-42ef-8327-c0872eceef6e_1038x840.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://courses.yaksas.in" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qax6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qax6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qax6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qax6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qax6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg" width="1038" height="840" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:840,&quot;width&quot;:1038,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:98717,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://courses.yaksas.in&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qax6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qax6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qax6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qax6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bd448b2-a824-4443-a6a2-209d19687688_1038x840.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Red Team Adversary Emulation Lab - FAQ]]></title><description><![CDATA[Frequently Asked Questions for the Red Team Adversary Emulation Lab]]></description><link>https://www.yaksas.com/p/red-team-adversary-emulation-lab-164</link><guid isPermaLink="false">https://www.yaksas.com/p/red-team-adversary-emulation-lab-164</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Thu, 19 Sep 2024 05:05:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Is there an option to just purchase the lab access instead of opting for self-host option?</h2><ul><li><p>No. At present students who wish to avail the lab can only opt for self-host option.</p></li></ul><h2>Do you plan to launch lab access packages in the near future?</h2><ul><li><p>No. We don&#8217;t have any plans to launch paid lab packages.</p></li></ul><h2>How much time will it take for the request to be processed after submitting the <a href="https://yks.red/RTAELabForm">Self-hosting Prerequisites and Eligibility Form</a>?</h2><ul><li><p>You should hear back from us within 24 hours.</p></li></ul><h2>Are all students eligible for self-host option?</h2><ul><li><p>Yes. All students who have signed up for the course either on Teachable or Udemy are eligible for self-host option.</p></li></ul><h2>Can I avail lab access without signing up for the course?</h2><ul><li><p>You will need to sign up for the course to be eligible for this option.</p></li></ul><h2>How can I check the charges I am incurring for hosting the lab?</h2><ul><li><p>You can check the charges in AWS Billing section.</p></li></ul><h2>Can I reverse engineer your lab?</h2><ul><li><p>Yes. Infact, we are counting on you for that. Not only will it be a good exercise in understanding how labs are created on AWS, it will enable you to create and share your labs in a similar manner.</p></li></ul><h2>How to reach the lab support team?</h2><ul><li><p>Once your request to self-host has been approved, you will be added to a student support channel on Discord. You can post all your queries there.</p></li></ul><h2>How will lab access be provided?</h2><ul><li><p>Lab access will be provided via browser-based interface. Through this interface you will be able to access a pre-configured Kali Linux machine via both, GUI and SSH.</p></li></ul><h2>Lab deployment got stuck or errored out in between, what should I do?</h2><ol><li><p>Run the <code>!destroy</code> command. That should clean up resources created during the failed depployment.</p></li><li><p>Once <code>!destroy</code> command has finished doing it&#8217;s magic, run <code>!deploy</code> command again.</p></li><li><p>If this doesn&#8217;t work, follow these steps to clean up your AWS account:</p><ul><li><p>a. Login to your AWS account &gt; EC2 - &gt; Terminate all running instances whose name starts with &#8220;TFL-&#8220; and &#8220;RTR-&#8220;. Wait for instances to terminate.</p></li><li><p>b. In EC2 go to Key Pairs -&gt; Select all key pairs starting with &#8220;tfl-box&#8221; and &#8220;rtr-attacker-box&#8221; -&gt; delete them</p></li><li><p>c. Go to VPC -&gt; Select VPC whose name starts with &#8220;TFL-LAB&#8221; -&gt; delete it (This operation should also delete all other network resources created by AKSH)</p></li><li><p>d. If you see multiple VPCs whose name starts with &#8220;TFL-LAB&#8221;, delete them one by one</p></li><li><p>e. Go to VPC -&gt; Internet gateways -&gt; Select internet gateway whose name starts with &#8220;TFL-LAB&#8221; -&gt; delete it (Note: this step is required in certain scenarios only).</p></li></ul></li></ol><h2>I have a question that is not listed here. Where should I post it?</h2><ul><li><p>Please join <a href="https://ykrt.in/discord">Yaksas Security on Discord</a>. You can post your questions in the #general channel of this course.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Active Directory User Enumeration using PowerView]]></title><description><![CDATA[As a pentester, you can leverage PowerView to find out information about domain users. These six commands will help you in user enumeration.]]></description><link>https://www.yaksas.com/p/active-directory-user-enumeration-using-powerview</link><guid isPermaLink="false">https://www.yaksas.com/p/active-directory-user-enumeration-using-powerview</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Mon, 08 Jul 2024 11:02:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/89ce74c7-c5cf-49b6-9823-ac57a8632331_600x338.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>PowerView, developed by Will Schroeder (@harmj0y), is a PowerShell tool to gain network situational awareness on Windows domains. It is now a part of PowerSploit suite. You can download PowerView from <a href="https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon">here.</a></p><p>As a pentester, you can leverage PowerView to find out information about domain users. Following commands will help you with that (watch the video for demonstration):</p><ul><li><p><strong>Get-NetUser</strong></p><ul><li><p>Get a list of all users in current domain</p></li></ul></li><li><p><strong>Get-NetUser &#8211;Domain ycsccorp.local</strong></p><ul><li><p>Get a list of all users in the specified domain</p></li></ul></li><li><p><strong>Invoke-UserHunter</strong></p><ul><li><p>Finds machines on the local domain where specified users are logged into. By default checks for domain admin accounts</p></li></ul></li><li><p><strong>Find-LocalAdminAccess</strong></p><ul><li><p>Finds machines on the domain that the current user has local admin access to</p></li></ul></li><li><p><strong>Invoke-EnumerateLocalAdmin</strong></p><ul><li><p>Enumerates members of the local Administrators groups across all machines in the domain</p></li></ul></li><li><p><strong>Invoke-CheckLocalAdminAccess</strong></p><ul><li><p>Check if the current user context has local administrator access to a specified host</p></li></ul></li></ul><h3>Watch the video demonstration</h3><div id="youtube2-gl6-8AXlfL4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;gl6-8AXlfL4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/gl6-8AXlfL4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Active Directory Network Recon using PowerView]]></title><description><![CDATA[As a pentester, you can leverage PowerView to find out information about an active directory network. These commands will help you with the network recon.]]></description><link>https://www.yaksas.com/p/active-directory-network-recon-using-powerview</link><guid isPermaLink="false">https://www.yaksas.com/p/active-directory-network-recon-using-powerview</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Mon, 08 Jul 2024 10:55:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/db1f682a-5b27-477a-a427-4d2bc4398b25_600x338.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Once you have compromised a machine in an Active Directory environment, the next thing you do is post-exploitation network recon.</p><p>PowerView, developed by Will Schroeder (@harmj0y), is a PowerShell tool to gain Active Directory network situational awareness on Windows domains. It is now a part of PowerSploit suite. You can download PowerView from <a href="https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon">here.</a> </p><p>As a pentester, you can leverage PowerView to find out information about an Active Directory network. Following commands will help you with that (watch the video for demonstration):</p><ul><li><p><strong>Get-NetComputer</strong></p><ul><li><p>Gets a list of all current servers in the domain</p></li></ul></li><li><p><strong>Get-IPAddress</strong></p><ul><li><p>Resolves a hostname to an IP</p></li></ul></li><li><p><strong>Get-NetForest</strong></p><ul><li><p>Gets the forest associated with the current user's domain</p></li></ul></li><li><p><strong>Get-NetForestDomain</strong></p><ul><li><p>Gets all domains for the current forest</p></li></ul></li><li><p><strong>Get-NetDomainController</strong></p><ul><li><p>Gets the domain controllers for the current computer's domain</p></li></ul></li><li><p><strong>Get-DomainSID</strong></p><ul><li><p>Return the SID for the specified domain</p></li></ul></li><li><p><strong>Get-NetShare</strong></p><ul><li><p>Gets share information for a specified server</p></li></ul></li></ul><p><strong>Watch the video demonstration</strong></p><div id="youtube2-8WbCCjXxCu4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;8WbCCjXxCu4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/8WbCCjXxCu4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Active Directory SPN Scanning using ADSI (Part 3)]]></title><description><![CDATA[This post explains how to scan an Active Directory environment for SPN using ADSI.]]></description><link>https://www.yaksas.com/p/active-directory-spn-scanning-using-adsi-part-3</link><guid isPermaLink="false">https://www.yaksas.com/p/active-directory-spn-scanning-using-adsi-part-3</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Mon, 08 Jul 2024 07:02:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/kzrhAbbc3Dc" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A Service Principal Name (SPN) is a unique identifier of a service instance. It is used to link an AD object (service accounts, users, computers etc.) with a service. It can be used as an alternative to a port scan in an Active Directory environment. Some common SPNs are:</p><ul><li><p>CIFS</p></li><li><p>host</p></li><li><p>HTTP</p></li><li><p>https</p></li><li><p>IMAP</p></li><li><p>mongod</p></li><li><p>mongos</p></li><li><p>MSSQL</p></li><li><p>MSSQLSvc</p></li><li><p>SMTP</p></li><li><p>POP</p></li><li><p>vnc</p></li><li><p>vpn</p></li></ul><p>A comprehensive list of SPNs is available <a href="https://adsecurity.org/?page_id=183">here</a></p><h3>How to scan for SPN using ADSI?</h3><p>In <a href="https://yaksas.in/ycscblog/ad-exploitation-using-adsi-part-2-adsisearcher/">Part 2</a> of this series we covered how to use filters with ADSI Searcher class. We can use the filter property to search an Active Directory for a particular SPN:</p><blockquote><p><strong>$adsiSearcherObj.Filter = &#8220;serviceprincipalname=&lt;spn&gt;&#8221;</strong></p></blockquote><p>Using the SPN list above and a bit of Powershell scripting, we can automate this task to search for a vast range of SPNs. The video below demonstrates this and the PowerShell script could be found <a href="https://github.com/yaksas443/YaksasCSC-Lab/blob/master/PTAD-Lab/Scan-SPN.ps1">here</a></p><div id="youtube2-kzrhAbbc3Dc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kzrhAbbc3Dc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kzrhAbbc3Dc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Active Directory Exploitation using ADSISearcher (Part 2)]]></title><description><![CDATA[This post gives an overview of ADSISearcher class and explains how to use it via PowerShell to enumerate Active Directory objects.]]></description><link>https://www.yaksas.com/p/active-directory-exploitation-using-adsisearcher-part-2</link><guid isPermaLink="false">https://www.yaksas.com/p/active-directory-exploitation-using-adsisearcher-part-2</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Mon, 08 Jul 2024 06:54:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/hAdXt55jNKk" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>ADSISearcher is a class for searching for objects in Active Directory. It is part of .NET framework (System.DirectoryServices.DirectorySearcher) and van be accessed via <a href="https://docs.microsoft.com/en-us/powershell/scripting/overview?view=powershell-7">PowerShell</a> by creating object for the above class</p><ul><li><p>Example:</p><ul><li><p><strong>$adsiSearcherObj = New-Object &#8211;TypeName System.DirectoryServices.DirectorySearcher</strong></p><ul><li><p>takes the LDAP path to current domain by default</p></li><li><p>Pass ADSI Directory Entry object type as ArgumentList to change the search path</p><ul><li><p><strong>-ArgumentList @([ADSI]&#8221;LDAP://dc=ycsccorp,dc=local&#8221;)</strong></p></li></ul></li></ul></li></ul></li></ul><p>OR</p><ul><li><p><strong>$adsiObj = [ADSI]&#8221;LDAP://dc=ind,dc=ycsccorp,dc=local&#8221;</strong></p><ul><li><p><strong>$adsiSearcherObj = [adsisearcher]$adsiObj</strong></p></li></ul></li></ul><p>OR</p><ul><li><p><strong>$adsiSearcherObj = [adsisearcher][ADSI]&#8221;LDAP://dc=ycsccorp,dc=local&#8221;</strong></p></li></ul><h3>ADSISearcher Functions</h3><p>To perform search operations, via ADSISearcher, on the specified search root we use FineOne() and FindAll() methods</p><ul><li><p>Syntax:</p><ul><li><p>Search for single object</p><ul><li><p><strong>$adsiSearcherObj.FindOne() &#8211; by default returns information about the search root</strong></p></li></ul></li><li><p>Search for multiple objects</p><ul><li><p><strong>$adsiSearcherObj.FindAll() &#8211; by default returns information about all objects within the search root</strong></p></li></ul></li></ul></li></ul><h3>ADSISearcher Filters</h3><p>We can search the search root for specific objects by using the Filter property offered by ADSISearcher object.</p><ul><li><p>Syntax:</p><ul><li><p>Filter for single object</p><ul><li><p>$adsiSearcherObj.Filter = &#8220;samAccountName=user.ind02&#8221;</p></li></ul></li><li><p>Filter using wild cards</p><ul><li><p>$adsiSearcherObj.Filter = &#8220;cn=*user*&#8221;</p></li><li><p>$adsiSearcherObj.Filter = &#8220;ou=*&#8221;</p></li></ul></li><li><p>Combining multiple filters</p><ul><li><p>$adsiSearcherObj.Filter = &#8220;(&amp;(cn=*admin*)(objectCategory=group))&#8221;</p></li><li><p>$adsiSearcherObj.Filter = &#8220;(|(cn=*sql*)(objectCategory=computer))&#8221;</p></li><li><p>$adsiSearcherObj.Filter = &#8220;(&amp;(!name=*ind*)(objectCategory=user))&#8221;</p></li></ul></li></ul></li></ul><h3>Watch the video</h3><div id="youtube2-hAdXt55jNKk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;hAdXt55jNKk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/hAdXt55jNKk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[AD Exploitation using ADSI - Part 1 (Introduction)]]></title><description><![CDATA[AD exploitation using ADSI | This post covers what is ADSI? and how to use it with Powershell to connect to and enumerate Active Directory?]]></description><link>https://www.yaksas.com/p/ad-exploitation-using-adsi-part-1</link><guid isPermaLink="false">https://www.yaksas.com/p/ad-exploitation-using-adsi-part-1</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Mon, 08 Jul 2024 06:25:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/QIoZ5a6HuEA" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Active Directory Service Interfaces (ADSI) &#8211; A set of <a href="https://docs.microsoft.com/en-us/windows/win32/com/com-objects-and-interfaces">Component Object Model (COM)</a> interfaces for managing Active Directory services. It can be utilized in several scripting and programming languages.</p><ul><li><p>Enables reading, adding and managing Active Directory Objects</p></li><li><p>Part of .NET framework:</p><ul><li><p>System.DirectoryServices.DirectoryEntry (ADSI)</p></li><li><p>System.DirectoryServices.DirectorySearcher (ADSISearcher)</p></li></ul></li><li><p>Can be accessed via PowerShell by creating objects for above classes</p></li><li><p>Example:</p><ul><li><p><strong>$domain = New-Object &#8211;TypeName System.DirectoryServices.DirectoryEntry</strong></p></li><li><p><strong>$domain2 = [System.DirectoryServices.DirectoryEntry]&#8221;LDAP://dc=ycsccorp,dc=local&#8221;</strong></p></li><li><p><strong>$domain3 = [ADSI]&#8221;LDAP://dc=ycsccorp,dc=local&#8221;</strong></p></li></ul></li></ul><h3>Using ADSI</h3><ul><li><p>Creating OU</p><ul><li><p>$domainOU = $domain1.Create(&#8220;organizationalUnit&#8221;,&#8221;ou=YCSCTest&#8221;)</p></li><li><p>$domainOU.SetInfo()</p></li></ul></li><li><p>Creating User</p><ul><li><p>$domainUser = $domain1.Create(&#8220;user&#8221;,&#8221;cn=YCSCUser&#8221;)</p></li><li><p>$domainOU.SetInfo()</p></li></ul></li></ul><h3>Pros and Cons</h3><ul><li><p>Pros</p><ul><li><p>It is available on most Windows machines by default</p></li><li><p>Does not require AD-Module, RSAT or any other special libraries</p></li><li><p>Not easily detected</p></li><li><p>Can be used to create custom tools leveraging ADSI and ADSISearcher</p></li></ul></li><li><p>Cons</p><ul><li><p>Takes some time to learn</p></li><li><p>Lack of documentation</p></li></ul></li></ul><h3>Watch the video</h3><div id="youtube2-QIoZ5a6HuEA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;QIoZ5a6HuEA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/QIoZ5a6HuEA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item></channel></rss>