loader from loading.io
Evilginx2 Man-in-the-Middle Attacks - Tradecraft Security Weekly #29 show art Evilginx2 Man-in-the-Middle Attacks - Tradecraft Security Weekly #29

Tradecraft Security Weekly (Video)

Evilginx2 is a man-in-the-middle framework that can be utilized to intercept credentials including two-factor methods victims utilize when logging in to a web application. Instead of just duplicating the target web application it proxies traffic to it making the experience seamless to the victim. In this episode Ralph May (@ralphte1) joins Beau Bullock to demo Evilginx2. LINKS: https://github.com/kgretzky/evilginx2 https://breakdev.org/evilginx-2-next-generation-of-phishing-2fa-tokens/

info_outline
Black Hat & DEF CON 2018 - Tradecraft Security Weekly #28 show art Black Hat & DEF CON 2018 - Tradecraft Security Weekly #28

Tradecraft Security Weekly (Video)

This is the Hacker Summer Camp 2018 edition of Tradecraft Security Weekly. In this week's episode Beau Bullock (@dafthack) talks about some of the more interesting items he saw come out of the Black Hat and DEF CON conferences this year. For Show Links:

info_outline
PXE Boot Attacks - Tradecraft Security Weekly #27 show art PXE Boot Attacks - Tradecraft Security Weekly #27

Tradecraft Security Weekly (Video)

Network administrators often utilize Pre-boot Execution Environment (PXE) to rapidly deploy new systems on a network easily. Golden system images can be created with all the software and settings already in place for new systems. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) discusses some of the potential attack vectors surrounding PXE boot deployments. Full Show Notes:

info_outline
OSINT & External Recon Pt. 2: Contact Discovery - Tradecraft Security Weekly #26 show art OSINT & External Recon Pt. 2: Contact Discovery - Tradecraft Security Weekly #26

Tradecraft Security Weekly (Video)

During the reconnaissance phase of a penetration test being able to discover employee names and email addresses of an organization is extremely important. It is also important to do so as stealthily as possible. Using open-source techniques and tools it is possible to enumerate employee names and email addresses at an organization. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) discusses some of the tools and techniques that can be used to do this. Full Show Notes: https://wiki.securityweekly.com/TS_Episode26

info_outline
Phishing 2FA Tokens with CredSniper - Tradecraft Security Weekly #25 show art Phishing 2FA Tokens with CredSniper - Tradecraft Security Weekly #25

Tradecraft Security Weekly (Video)

Organizations are implementing two-factor on more and more web services. The traditional methods for phishing credentials is no longer good enough to gain access to user accounts if 2FA is setup. In this episode Mike Felch (@ustayready) and Beau Bullock (@dafthack) demonstrate a tool that Mike wrote called CredSniper that assists in cloning portals for harvesting two-factor tokens. Links:

info_outline
Evading Network-Based Detection Mechanisms - Tradecraft Security Weekly #24 show art Evading Network-Based Detection Mechanisms - Tradecraft Security Weekly #24

Tradecraft Security Weekly (Video)

In this episode of Tradecraft Security Weekly hosts Beau Bullock (@dafthack) and Mike Felch (@ustayready) discuss methods for evading network-based detection mechanisms. Many commercial IDS/IPS devices do a pretty decent job of detecting standard pentesting tools like Nmap when no evasion options are used. Additionally, companies are doing a better job at detecting and blocking IP addresses performing password attacks. Proxycannon is a tool that allows pentesters to spin up multiple servers to proxy attempts through to bypass some of these detection mechanisms. Links: Nmap Evasion Options...

info_outline
HTML5 Storage Exfil via XSS - Tradecraft Security Weekly #23 show art HTML5 Storage Exfil via XSS - Tradecraft Security Weekly #23

Tradecraft Security Weekly (Video)

It is fairly common for pentesters to discover Cross-Site Scripting (XSS) vulnerabilities on web application assessments. Exploiting these issues potentially allow access to a user's session tokens enabling attackers to navigate a site as the victim in the context of the web application. In this episode the hosts Beau Bullock (@dafthack) & Mike Felch (@ustayready) demonstrate how to exploit a XSS vulnerability to access HTML5 local storage to steal a cookie. (Sorry the camera video feed froze at 9 minutes)

info_outline
Linux Privilege Escalation - Tradecraft Security Weekly #22 show art Linux Privilege Escalation - Tradecraft Security Weekly #22

Tradecraft Security Weekly (Video)

After getting a shell on a server you may or may not have root access. To gain privileged access to a Linux system it may take performing more analysis of the system to find escalation issues. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) provides a methodology for performing various privilege escalation techniques against Linux-based systems. Full Show Notes:

info_outline
Leaking Windows Creds Externally Via MS Office - Tradecraft Security Weekly #21 show art Leaking Windows Creds Externally Via MS Office - Tradecraft Security Weekly #21

Tradecraft Security Weekly (Video)

In this episode of Tradecraft Security Weekly, Mike Felch discusses with Beau Bullock about the possibilities of using framesets in MS Office documents to send Windows password hashes remotely across the Internet. This technique has the ability to bypass many common security controls so add it to your red team toolboxes. LINKS: SensePost Blog -

info_outline
Google Event Injection - Tradecraft Security Weekly #20 show art Google Event Injection - Tradecraft Security Weekly #20

Tradecraft Security Weekly (Video)

Google provides the ability to automatically add events to a calendar directly from emails received by Gmail. This provides a unique situation for phishing attempts as most users haven't been trained to watch their calendar events for social engineering attempts. In this episode Beau Bullock (@dafthack) and Michael Felch (@ustayready) show how to inject events into a targets calendar using MailSniper bypassing some security controls that Google has in place. Links: Blog Post:

info_outline
 
More Episodes

There are a ton of modules in Metasploit that are extremely useful for performing various attacks post-exploitation. But sometimes there are external tools that you might want to use that are not included in Metasploit. It's possible to proxy other external tools through a Meterpreter session using a module in Metasploit and proxychains. In this episode Derek Banks (@0xderuke) and Beau Bullock (@dafthack) talk about how to pivot external tools through Meterpreter sessions and demo how to dump Kerberos tickets using this method.

LINKS:

BHIS Toast to Kerberoast Blog - https://www.blackhillsinfosec.com/a-toast-to-kerberoast/