7h3h4ckv157's Avatar

7h3h4ckv157

@7h3h4ckv157

Hacker (He/Him) | Hall of Fame: Google, Apple, NASA, 𝕏 (Twitter) | Speaker: BlackHat MEA x1 | CVE Γ—4 | HTB Rank: Guru | P1 warrior - Bugcrowd | CS Engineer

28
Followers
7
Following
5
Posts
17.03.2025
Joined
Posts Following

Latest posts by 7h3h4ckv157 @7h3h4ckv157

Red Teamers: If your target is using Okta (check <orgname>.okta.com), pull a TGS for the SPN HTTP/<orgname>.kerberos.okta.com and inject it into your host session. When proxied, this will allow you to access their Okta dashboard.
Rubeus asktgs /spn:<spn>
Rubeus ptt /ticket:<ticket>

07.04.2025 15:33 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Yupp

25.03.2025 13:36 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

βœŒπŸ»πŸ˜‚

17.03.2025 11:32 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Yes…! This is enough for me

17.03.2025 09:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

❀️

17.03.2025 06:29 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Right side army…

Assemble!

17.03.2025 06:24 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

As a reminder, my "red team tips" found both on this and where I used to post them (the Nazi app) are not necessarily tips specifically for adversary emulators; they are generalized offensive tips useful to both penetration testers and red teamers. "Red team" is shorthand here!

24.01.2025 17:28 πŸ‘ 7 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Red Teamers: do NOT neglect SNMP like sysadmins usually do! SO many networks have granted me very quick wins through SNMP enumeration, which can be done with Metasploit, snmpwalk, and onesixtyone:

Enum Windows accounts (spray?):
snmpwalk -c public -v1 $TARGET 1.3.6.1.4.1.77.1.2.25
#hacking #redteam

24.01.2025 17:33 πŸ‘ 17 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0