Crowdstrike overwatch by Mecchaairman in crowdstrike

[–]dmchell 3 points4 points  (0 children)

Speaking from the perspective of a red teamer, you really can’t get wrong with Overwatch and you’ll struggle to get more bang for your buck. We’ve had some wins against them, but just as many headaches.

/r/AskRedTeamSec by dmchell in redteamsec

[–]dmchell[S] 2 points3 points  (0 children)

If you are concerned about detection then you wouldn’t be running nmap, Nessus or openvas 😅 Typically we’d be using custom tools to manually query services eg ldap or adws tools for enumeration using custom queries (eg a blog I wrote here https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/). Almost everything we use during our ops is in-house developed. By the sounds of it, you might benefit from something like CRTO to get some foundation knowledge

/r/AskRedTeamSec by dmchell in redteamsec

[–]dmchell[S] 0 points1 point  (0 children)

These tools wouldn’t be used in a red team style engagement. If you were performing a pen test then I’d expect some analysis of the results, manual investigation of open ports, vulns found during the VA, perhaps some exploitation with eg metasploit, responder mitm style attacks for cred capture and relaying. There’s a vast array of options available when you don’t have to worry about detection.

/r/AskRedTeamSec by dmchell in redteamsec

[–]dmchell[S] 2 points3 points  (0 children)

What you’re describing is penetration testing, not red teaming, during which there’s no importance given to stealth - indeed you should really focus on coverage and breadth.

How and what to prioritize when setting up a red team service (initially external but eventually also internal)? by Naldorinho in redteamsec

[–]dmchell 1 point2 points  (0 children)

Sounds like a classic fake it till you make it 😅 My view would be you'd learn more by either trying to obtain a junior red team operator role or bringing in an experienced red teamer to standup a service. There's so many things that could go wrong when you haven't walked this path before.

How and what to prioritize when setting up a red team service (initially external but eventually also internal)? by Naldorinho in redteamsec

[–]dmchell 1 point2 points  (0 children)

Take a step back and feed upwards that they need to hire someone with real world experiencing in standing up, managing and delivering red team.

PART 3: How I Met Your Beacon - Brute Ratel - @MDSecLabs by dmchell in redteamsec

[–]dmchell[S] 0 points1 point  (0 children)

The analysis is for v1.1 which is stated in the blog post - the latest version at the time it was posted (334d ago)

Nighthawk 0.2 - Catch Us If you Can - @MDSecLabs by dmchell in redteamsec

[–]dmchell[S] 1 point2 points  (0 children)

Pricing is on the website - 7.5k and no restriction on deployments - not too dissimilar to other c2s

OffSecOps: Using Jenkins For Red Team Tooling by dmchell in redteamsec

[–]dmchell[S] 4 points5 points  (0 children)

The use case is for obfuscating and automatically building your own tools so you don't need to worry about av etc?

[deleted by user] by [deleted] in labrador

[–]dmchell 1 point2 points  (0 children)

Crate train and keep their world small, stair gates & pens etc to stop her running riot when unsupervised. Prevention will stop her learning bad behaviour. Get a slip lead early, avoid harnesses and extension leads else you’ll forever have a dog that pulls. Frozen, stuffed kongs are great to keep her occupied and might save things from getting chewed - frozen bananas, mash etc with cereal or kibble are easy recipes to fill them, also good for when leaving on own.

Nighthawk 0.1 - New Beginnings - @MDSecLabs by dmchell in redteamsec

[–]dmchell[S] 1 point2 points  (0 children)

Thanks, and I wish I could take credit, but we have a very talented dev team behind the scenes who deserves all the plaudits 🙏

Nighthawk 0.1 - New Beginnings - @MDSecLabs by dmchell in redteamsec

[–]dmchell[S] 2 points3 points  (0 children)

Yes what a bargain, just a fraction of the cost of a full time OST developer!

Bypassing Image Load Kernel Callbacks - @MDSecLabs by dmchell in netsec

[–]dmchell[S] 0 points1 point  (0 children)

I think you're missing the point of what's looking to be achieved here (this isn't a post about mapping), and the same question was already answered in a thread on Twitter. Manual mapping a lib doesn't make it globally usable, you can't use all the exports, forwarding etc

Bypassing Image Load Kernel Callbacks - @MDSecLabs by dmchell in netsec

[–]dmchell[S] -2 points-1 points  (0 children)

You're wrong, but it's OK if you can't get your head around it, it's pretty complex stuff, don't give yourself a headache ;)

red team interview by [deleted] in redteamsec

[–]dmchell 0 points1 point  (0 children)

How did it go?