Yaksas Security
Subscribe
Sign in
Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Adversary Emulation
Latest
Top
PoshC2: A Red Teamer's Notes
A quick reference guide for using PoshC2, a post-exploitation framework, during penetration testing and red teaming engagements.
Sep 29, 2024
•
Yaksas Security
Share this post
Yaksas Security
PoshC2: A Red Teamer's Notes
Copy link
Facebook
Email
Notes
More
The Three Command and Control Tiers
This post covers the three command and control tiers commonly used during red team and adversary emulation engagements.
Sep 29, 2024
•
Yaksas Security
Share this post
Yaksas Security
The Three Command and Control Tiers
Copy link
Facebook
Email
Notes
More
Introduction to MITRE ATT&CK Framework
This post covers basics of MITRE ATT&CK framework. One of the use cases of ATT&CK is Adversary Emulation exercises.
Sep 29, 2024
•
Yaksas Security
Share this post
Yaksas Security
Introduction to MITRE ATT&CK Framework
Copy link
Facebook
Email
Notes
More
What is Adversary Emulation?
Learn about adversary emulation. This post is part of our course Red Team Adversary Emulation: Mimicking a real-world cyber attack
Sep 29, 2024
•
Yaksas Security
Share this post
Yaksas Security
What is Adversary Emulation?
Copy link
Facebook
Email
Notes
More
Red Team Operations Attack Lifecycle
The nine-step process of conducting red team and adversary emulation exercises.
Sep 29, 2024
•
Yaksas Security
Share this post
Yaksas Security
Red Team Operations Attack Lifecycle
Copy link
Facebook
Email
Notes
More
Red Team Adversary Emulation Lab - Tax First Labz
Red team lab to go along with the course Red Team Adversary Emulation (https://yks.red/RTAE)
Sep 21, 2024
•
Yaksas Security
Share this post
Yaksas Security
Red Team Adversary Emulation Lab - Tax First Labz
Copy link
Facebook
Email
Notes
More
Red Team Adversary Emulation Course
In this course, you will look at an organization’s security from a real-world adversary perspective
Sep 20, 2024
•
Yaksas Security
Share this post
Yaksas Security
Red Team Adversary Emulation Course
Copy link
Facebook
Email
Notes
More
Capture the flag - Tax First Labz
Capture the flag lab for the course Red Team Adversary Emulation.
Sep 20, 2024
•
Yaksas Security
Share this post
Yaksas Security
Capture the flag - Tax First Labz
Copy link
Facebook
Email
Notes
More
Red Team Adversary Emulation Lab - FAQ
Frequently Asked Questions for the Red Team Adversary Emulation Lab
Sep 19, 2024
•
Yaksas Security
Share this post
Yaksas Security
Red Team Adversary Emulation Lab - FAQ
Copy link
Facebook
Email
Notes
More
Active Directory User Enumeration using PowerView
As a pentester, you can leverage PowerView to find out information about domain users. These six commands will help you in user enumeration.
Jul 8, 2024
•
Yaksas Security
Share this post
Yaksas Security
Active Directory User Enumeration using PowerView
Copy link
Facebook
Email
Notes
More
Active Directory Network Recon using PowerView
As a pentester, you can leverage PowerView to find out information about an active directory network. These commands will help you with the network…
Jul 8, 2024
•
Yaksas Security
Share this post
Yaksas Security
Active Directory Network Recon using PowerView
Copy link
Facebook
Email
Notes
More
AD Exploitation using ADSI - Part 1 (Introduction)
AD exploitation using ADSI | This post covers what is ADSI? and how to use it with Powershell to connect to and enumerate Active Directory?
Jul 8, 2024
•
Yaksas Security
Share this post
Yaksas Security
AD Exploitation using ADSI - Part 1 (Introduction)
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts