I’ve created a bunch of Active Directory scripts to help identify attack points or stale accounts. This can be used for both, Blue and Red team members as they dive into abusable privileges….
With malicious parties continuing to use Powershell as their way in, I thought I would look into how it’s being used and what can be done to prevent it. This is something I’ve covered before, so think of this as a part 3…………
A common debate in cyber security is “can a user have admin rights to their machine?”
Personally, I’ve always been on the side of no but recently been I’ve been torn.
Hence why I’m now brain dumping on my blog…..
Meterpreter is a very powerful payload that can be dropped using an exploit in Metasploit. Once obtained, there is quite a lot that you can do. This is what I’m going to cover below. To find out more about Meterpreter, click the link below. This site also has examples on how to use the modules……..
When thinking of phishing, you might think of ‘Winning the Nigeran lottery’ or ‘Paying a small holding fee so that a prince can make you rich’. These were common attempts back in the day and the aim was to trick you so that you would send the scammer money. Since then, Phisher-men and women have evolved and are now using new techniques. What these people want though are very different things. Nowadays these types of attacks aim to steal personal details, credentials, money or even to infect the users machine……