VirtualSamurai
@VirtualSamuraii
Followers
295
Following
392
Media
14
Statuses
47
Hello friend
Joined January 2021
Salut đđŒ Jâai Ă©cris un article qui est un retour dâexpĂ©rience dâune attaque rĂ©elle sur un rĂ©seau Wi-Fi WPA2-Enterprise. NâhĂ©sitez pas Ă me donner votre avis đ https://t.co/rPOqSWygxY
#redteam #wifi
7
24
112
The Legacy lab is available now on @cyb3rw4v3 !
You're starting a #redteam engagement tomorrow...Where would you train without spending tons of money ? We are releasing a new redteam lab with : - On-prem #ActiveDirectory - 5 vulnerable machines - Antivirus & Firewall Available on November 8th here : https://t.co/oM9Jd2aRCU
0
0
0
You're starting a #redteam engagement tomorrow...Where would you train without spending tons of money ? We are releasing a new redteam lab with : - On-prem #ActiveDirectory - 5 vulnerable machines - Antivirus & Firewall Available on November 8th here : https://t.co/oM9Jd2aRCU
0
2
5
@L0rd5ud0 @trevorsaudi @f0rk3b0mb Guys, please join our discord server so I can easily reach out. https://t.co/2DxjVhelJE
discord.com
DĂ©couvre la communautĂ© CyberWave đ sur Discord - discute avec 531 autres membres et profite du chat vocal et textuel gratuit.
1
0
1
And the winners are : - @L0rd5ud0 - @trevorsaudi - @f0rk3b0mb Congrats ! I will reach out via private message ;)
1
0
3
NEW RED TEAM LAB đŽââ ïž You're starting a red team engagement tomorrow... - How would you manage to evade defense solutions (AV/EDR) ? - Where would you train without spending tons of money ? If you don't have the answers to these questions, don't worry, I got you covered. I'm
4
6
13
Is smishing more dangerous than phishing? It takes a few minutes to register on a SMS service, change the SenderID and pretend to be a known contact to a victim. Here, I'm pretending to be OVHcloud and Iâve sent a SMS to myself. The iOS Message application even displays the
0
0
3
During a Red Team engagement, one must be aware of every action, even when it comes to Wi-Fi testing. Sometimes, we have to send "deauthentication" packets to authenticated devices using tools like Aireplay-ng, in an attempt to capture a handshake and access the targeted network
0
1
7
đ Hackers sometimes gain access to a company's Wi-Fi network. In this blog post, we share some insights about a Wi-Fi (WPA2-Enterprise) penetration test that we conducted for an organisation. https://t.co/YKAA8CTMhW
0
2
2
I did a DNS resolution on more than 4 million domain names with the .fr TLD Result: around 3.5 million domains might be spoofed by attackers because they don't have a DMARC record (let alone an SPF record). Domains belonging to companies such as Microsoft are also vulnerable.
0
0
2
Hey there đđŒ I have been using an Ansible playbook to deploy a phishing server on a cloud instance for my engagements. Thought it might be useful for cyber security professionals out there. https://t.co/BODnLnbnEi
github.com
Deploy a phishing infrastructure on the fly. Contribute to VirtualSamuraii/flyphish development by creating an account on GitHub.
1
35
130
Salut đđŒ Voici un petit article qui explique comment il est possible de personnaliser des outils publics pour contourner les antivirus. Ici, il sâagira de personnaliser lâagent Apollo du C2 Mythic pour contourner Windows Defender. https://t.co/0wyiRfYVc5
virtualsamuraii.github.io
Personnaliser un outil pour contourner les antivirus
0
2
16
OSINT : Certaines entreprises divulguent des informations bien trop prĂ©cieuses dans leurs offres d'emploi. C'est par exemple le cas ici, l'entreprise en question donne mĂȘme la marque de son EDR. Ceci peut aider les attaquants Ă dĂ©velopper des malwares (implants, loaders,
0
2
11
I've just started a blog on #maldev and #redteaming. Nothing fancy yet, just me trying to see if I've understood correctly. The first post is about a custom version of GetModuleHandle and GetProcAddress in #go. Check it out:
blog.atsika.ninja
Resolve module handle and function address without using GetModuleHandle and GetProcAddress
5
33
103
Hello world đ In 2022, @0xNarek and I studied an APT named Serpent Group that has been discovered by @proofpoint and @VMware TAU. This threat actor targeted numerous french government entities during the 2022 presidential campaign. We reproduced their TTPs and came up
1
6
11
Salut, shalom, salam camarades. Voici la 3eme partie de la série « Anatomie des EDR ». Cette fois ci, on va voir les processus, services, PPL et clés de registre Windows, utilisés par un EDR. https://t.co/zmcjUtBTUL
#redteam #windows #edr #maldev
0
10
39
Hello, Voici la partie 2 de la sĂ©rie dâarticles Anatomie des EDR. Cette fois ci, on va voir le fonctionnement des drivers dâun EDR avec plus de dĂ©tails (kernel, callbacks, minifilters, etc). https://t.co/Y4jF1DvLKh
#redteam #maldev #edr #blueteam
1
13
29
Salut salut, Voici un premier article que jâai pondu pour dĂ©crire de maniĂšre trĂšs vulgarisĂ©e ce quâest concrĂštement un EDR. Jâai pris #SentinelOne en exemple car il est considĂ©rĂ© comme Ă©tant lâun des leaders. https://t.co/z4HZe3cJ5F
#redteam #maldev
3
17
43