VirtualSamuraii Profile Banner
VirtualSamurai Profile
VirtualSamurai

@VirtualSamuraii

Followers
295
Following
392
Media
14
Statuses
47

Hello friend

Joined January 2021
Don't wanna be here? Send us removal request.
@VirtualSamuraii
VirtualSamurai
2 years
Salut đŸ‘‹đŸŒ J’ai Ă©cris un article qui est un retour d’expĂ©rience d’une attaque rĂ©elle sur un rĂ©seau Wi-Fi WPA2-Enterprise. N’hĂ©sitez pas Ă  me donner votre avis 😉 https://t.co/rPOqSWygxY #redteam #wifi
7
24
112
@VirtualSamuraii
VirtualSamurai
2 months
The Legacy lab is available now on @cyb3rw4v3 !
@cyb3rw4v3
CyberWave
2 months
You're starting a #redteam engagement tomorrow...Where would you train without spending tons of money ? We are releasing a new redteam lab with : - On-prem #ActiveDirectory - 5 vulnerable machines - Antivirus & Firewall Available on November 8th here : https://t.co/oM9Jd2aRCU
0
0
0
@cyb3rw4v3
CyberWave
2 months
You're starting a #redteam engagement tomorrow...Where would you train without spending tons of money ? We are releasing a new redteam lab with : - On-prem #ActiveDirectory - 5 vulnerable machines - Antivirus & Firewall Available on November 8th here : https://t.co/oM9Jd2aRCU
0
2
5
@VirtualSamuraii
VirtualSamurai
2 months
And the winners are : - @L0rd5ud0 - @trevorsaudi - @f0rk3b0mb Congrats ! I will reach out via private message ;)
1
0
3
@VirtualSamuraii
VirtualSamurai
2 months
NEW RED TEAM LAB đŸŽâ€â˜ ïž You're starting a red team engagement tomorrow... - How would you manage to evade defense solutions (AV/EDR) ? - Where would you train without spending tons of money ? If you don't have the answers to these questions, don't worry, I got you covered. I'm
4
6
13
@VirtualSamuraii
VirtualSamurai
5 months
Is smishing more dangerous than phishing? It takes a few minutes to register on a SMS service, change the SenderID and pretend to be a known contact to a victim. Here, I'm pretending to be OVHcloud and I’ve sent a SMS to myself. The iOS Message application even displays the
0
0
3
@VirtualSamuraii
VirtualSamurai
6 months
During a Red Team engagement, one must be aware of every action, even when it comes to Wi-Fi testing. Sometimes, we have to send "deauthentication" packets to authenticated devices using tools like Aireplay-ng, in an attempt to capture a handshake and access the targeted network
0
1
7
@cyb3rw4v3
CyberWave
9 months
🛜 Hackers sometimes gain access to a company's Wi-Fi network. In this blog post, we share some insights about a Wi-Fi (WPA2-Enterprise) penetration test that we conducted for an organisation. https://t.co/YKAA8CTMhW
0
2
2
@VirtualSamuraii
VirtualSamurai
9 months
I did a DNS resolution on more than 4 million domain names with the .fr TLD Result: around 3.5 million domains might be spoofed by attackers because they don't have a DMARC record (let alone an SPF record). Domains belonging to companies such as Microsoft are also vulnerable.
0
0
2
@VirtualSamuraii
VirtualSamurai
1 year
Hey there đŸ‘‹đŸŒ I have been using an Ansible playbook to deploy a phishing server on a cloud instance for my engagements. Thought it might be useful for cyber security professionals out there. https://t.co/BODnLnbnEi
Tweet card summary image
github.com
Deploy a phishing infrastructure on the fly. Contribute to VirtualSamuraii/flyphish development by creating an account on GitHub.
1
35
130
@VirtualSamuraii
VirtualSamurai
1 year
Salut đŸ‘‹đŸŒ Voici un petit article qui explique comment il est possible de personnaliser des outils publics pour contourner les antivirus. Ici, il s’agira de personnaliser l’agent Apollo du C2 Mythic pour contourner Windows Defender. https://t.co/0wyiRfYVc5
virtualsamuraii.github.io
Personnaliser un outil pour contourner les antivirus
0
2
16
@VirtualSamuraii
VirtualSamurai
1 year
OSINT : Certaines entreprises divulguent des informations bien trop prĂ©cieuses dans leurs offres d'emploi. C'est par exemple le cas ici, l'entreprise en question donne mĂȘme la marque de son EDR. Ceci peut aider les attaquants Ă  dĂ©velopper des malwares (implants, loaders,
0
2
11
@_atsika
Atsika
2 years
I've just started a blog on #maldev and #redteaming. Nothing fancy yet, just me trying to see if I've understood correctly. The first post is about a custom version of GetModuleHandle and GetProcAddress in #go. Check it out:
Tweet card summary image
blog.atsika.ninja
Resolve module handle and function address without using GetModuleHandle and GetProcAddress
5
33
103
@VirtualSamuraii
VirtualSamurai
1 year
Hello world 👋 In 2022, @0xNarek and I studied an APT named Serpent Group that has been discovered by @proofpoint and @VMware TAU. This threat actor targeted numerous french government entities during the 2022 presidential campaign. We reproduced their TTPs and came up
1
6
11
@VirtualSamuraii
VirtualSamurai
2 years
Collector celui lĂ  @asso_hzv
0
0
14
@VirtualSamuraii
VirtualSamurai
2 years
Salut, shalom, salam camarades. Voici la 3eme partie de la série « Anatomie des EDR ». Cette fois ci, on va voir les processus, services, PPL et clés de registre Windows, utilisés par un EDR. https://t.co/zmcjUtBTUL #redteam #windows #edr #maldev
0
10
39
@VirtualSamuraii
VirtualSamurai
3 years
Hello, Voici la partie 2 de la sĂ©rie d’articles Anatomie des EDR. Cette fois ci, on va voir le fonctionnement des drivers d’un EDR avec plus de dĂ©tails (kernel, callbacks, minifilters, etc). https://t.co/Y4jF1DvLKh #redteam #maldev #edr #blueteam
1
13
29
@VirtualSamuraii
VirtualSamurai
3 years
Salut salut, Voici un premier article que j’ai pondu pour dĂ©crire de maniĂšre trĂšs vulgarisĂ©e ce qu’est concrĂštement un EDR. J’ai pris #SentinelOne en exemple car il est considĂ©rĂ© comme Ă©tant l’un des leaders. https://t.co/z4HZe3cJ5F #redteam #maldev
3
17
43