{"id":130,"date":"2021-04-24T01:01:02","date_gmt":"2021-04-24T01:01:02","guid":{"rendered":"https:\/\/sirensecurity.io\/blog\/?page_id=130"},"modified":"2024-09-09T16:43:59","modified_gmt":"2024-09-09T16:43:59","slug":"red-teaming-resources","status":"publish","type":"page","link":"https:\/\/sirensecurity.io\/blog\/red-teaming-resources\/","title":{"rendered":"Red Teaming -  Resources"},"content":{"rendered":"\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"3000\" height=\"2000\" class=\"wp-block-cover__image-background wp-image-93\" alt=\"\" src=\"https:\/\/sirensecurity.io\/blog\/wp-content\/uploads\/2021\/04\/7.jpg\" data-object-fit=\"cover\"\/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-vivid-red-color has-text-color\">S1REN<\/p>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\">Knock Knock.<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong>Resources<\/strong><\/p>\n\n\n\n<p><br>+ <strong>Top Five Ways I got Domain Admin on your Internal Network <em>Before Lunch<\/em>.<\/strong><br><a rel=\"noreferrer noopener\" href=\"https:\/\/adam-toscher.medium.com\/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa\" target=\"_blank\">https:\/\/adam-toscher.medium.com\/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa<\/a><br><br><\/p>\n\n\n\n<p>+ <strong>Impacket NTLMRelay.<\/strong><br><a href=\"https:\/\/github.com\/SecureAuthCorp\/impacket\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/SecureAuthCorp\/impacket<\/a><br><a href=\"https:\/\/www.secureauth.com\/labs\/open-source-tools\/impacket\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.secureauth.com\/labs\/open-source-tools\/impacket\/<\/a><br><br>+ <strong>NetExec. <\/strong><br><a href=\"https:\/\/github.com\/byt3bl33d3r\/CrackMapExec\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Pennyw0rth\/NetExec<\/a><br><br>+ <strong>Lateral Movement.<\/strong><br><a href=\"https:\/\/github.com\/an4kein\/awesome-red-teaming#-lateral-movement\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/an4kein\/awesome-red-teaming#-lateral-movement<br><\/a><br>+ <strong>Embedded and Peripheral Device Hacking<\/strong><br><a href=\"https:\/\/github.com\/an4kein\/awesome-red-teaming#-embedded-and-peripheral-devices-hacking\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/an4kein\/awesome-red-teaming#-embedded-and-peripheral-devices-hacking<\/a><br><br>+ <strong>OSINT<\/strong>.<br><a href=\"https:\/\/github.com\/an4kein\/awesome-red-teaming#-osint\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/an4kein\/awesome-red-teaming#-osint<\/a><br><br>+ <strong>Command and Control<\/strong>.<br><a href=\"https:\/\/github.com\/an4kein\/awesome-red-teaming#-command-and-control\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/an4kein\/awesome-red-teaming#-command-and-control<\/a><br><\/p>\n\n\n\n<p>+ <strong>Phishing Attack Campaigns<\/strong><br><a href=\"https:\/\/github.com\/an4kein\/awesome-red-teaming#-social-engineering\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/an4kein\/awesome-red-teaming#-social-engineering<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Resources + Top Five Ways I got Domain Admin on your Internal Network Before Lunch.https:\/\/adam-toscher.medium.com\/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa + Impacket NTLMRelay.https:\/\/github.com\/SecureAuthCorp\/impackethttps:\/\/www.secureauth.com\/labs\/open-source-tools\/impacket\/ + NetExec. https:\/\/github.com\/Pennyw0rth\/NetExec + Lateral Movement.https:\/\/github.com\/an4kein\/awesome-red-teaming#-lateral-movement+ Embedded and Peripheral Device Hackinghttps:\/\/github.com\/an4kein\/awesome-red-teaming#-embedded-and-peripheral-devices-hacking + OSINT.https:\/\/github.com\/an4kein\/awesome-red-teaming#-osint + Command and Control.https:\/\/github.com\/an4kein\/awesome-red-teaming#-command-and-control + Phishing Attack Campaignshttps:\/\/github.com\/an4kein\/awesome-red-teaming#-social-engineering<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-130","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/pages\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":19,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/pages\/130\/revisions"}],"predecessor-version":[{"id":686,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/pages\/130\/revisions\/686"}],"wp:attachment":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/media?parent=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}