7h3h4ckv157
banner
7h3h4ckv157.bsky.social
7h3h4ckv157
@7h3h4ckv157.bsky.social
Hacker (He/Him) | Hall of Fame: Google, Apple, NASA, 𝕏 (Twitter) | Speaker: BlackHat MEA x1 | CVE ×4 | HTB Rank: Guru | P1 warrior - Bugcrowd | CS Engineer
Reposted by 7h3h4ckv157
Red Teamers: If your target is using Okta (check <orgname>.okta.com), pull a TGS for the SPN HTTP/<orgname>.kerberos.okta.com and inject it into your host session. When proxied, this will allow you to access their Okta dashboard.
Rubeus asktgs /spn:<spn>
Rubeus ptt /ticket:<ticket>
April 7, 2025 at 3:33 PM
✌🏻😂
March 17, 2025 at 11:32 AM
Yes…! This is enough for me
March 17, 2025 at 9:04 AM
Right side army…

Assemble!
March 17, 2025 at 6:24 AM
Reposted by 7h3h4ckv157
As a reminder, my "red team tips" found both on this and where I used to post them (the Nazi app) are not necessarily tips specifically for adversary emulators; they are generalized offensive tips useful to both penetration testers and red teamers. "Red team" is shorthand here!
January 24, 2025 at 5:28 PM
Reposted by 7h3h4ckv157
Red Teamers: do NOT neglect SNMP like sysadmins usually do! SO many networks have granted me very quick wins through SNMP enumeration, which can be done with Metasploit, snmpwalk, and onesixtyone:

Enum Windows accounts (spray?):
snmpwalk -c public -v1 $TARGET 1.3.6.1.4.1.77.1.2.25
#hacking #redteam
January 24, 2025 at 5:33 PM