Unlock the Power of VBA for Initial Access & Red Teaming ?? Watch the Full Playlist Here: https://lnkd.in/dDbeScFn Red Teamers, Ready to Take Your Offensive Tooling to the Next Level? ?? Introducing the Offensive VBA YouTube playlist—a deep dive into leveraging Visual Basic for Applications (VBA) for initial access, payload execution, and red team resource development. This series is designed to equip you with practical skills for crafting macro-enabled documents that bypass security controls and facilitate remote access. ?? What’s Inside the Playlist? 0x1 - Your First Macro → Learn the fundamentals of VBA and how macros work in MS Office. 0x2 - Program & Command Execution → Execute external commands & programs via VBA. 0x3 - Developing PowerShell Droppers → Deploy payloads using PowerShell and in-memory execution techniques. 0x4 - Reverse Shell Macro with Powercat → Craft a VBA macro for establishing a stealthy reverse shell. 0x5 - Embedding Metasploit Payloads in VBA Macros → Integrate Msfvenom payloads for full control over compromised systems. Who Is This For? ? Red Teamers & Adversary Emulation Professionals ? Penetration Testers Looking to Enhance Initial Access Tactics ? Anyone Interested in Weaponizing VBA for Offensive Security ?? Watch the Full Playlist Here: https://lnkd.in/dDbeScFn ?? Drop your thoughts in the comments! What other VBA-based techniques do you use in red team operations? Let’s share knowledge and sharpen our tradecraft! #CyberSecurity #RedTeam #OffensiveVBA #InitialAccess #AdversaryEmulation #HackerTools #Metasploit #PowerShell #VBA #Pentesting
关于我们
HackerSploit is the leading provider of free Infosec and cybersecurity training. Our goal is to make cybersecurity training more effective and accessible to students and professionals. We achieve this by providing essential training on how to attack and defend systems with virtual labs and real-world scenarios. We offer individual and corporate training packages in Penetration Testing & Red Team Operations, Web application penetration testing, and cybersecurity awareness training.
- 网站
-
https://youtube.com/HackerSploit
HackerSploit的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 2-10 人
- 总部
- Nairobi,Nairobi Area
- 类型
- 私人持股
- 创立
- 2017
- 领域
- Cybersecurity、Penetration Testing、Ransomware、Malware、Infosec和Ethical Hacking
地点
-
主要
Nairobi
KE,Nairobi Area,Nairobi,00100
HackerSploit员工
-
Sam A.
Experienced Data Analyst and Network Consultant with expertise in Penetration Testing and Network Security.
-
Quentin Hottekiet--Beaucourt
Empowering businesses to navigate across cyber threats ?? and secure ?? their systems across multi-cloud ?? platforms ensuring robust, scalable…
-
Alexis Ahmed
Penetration Tester & Red Team Instructor | Founder & CTO @HackerSploit | Trained Over 500,000 Cyber Security Professionals | DEF CON Speaker | Author…
-
Mk Tech Pro
HackerSploit
动态
-
?? Emulating FIN6 - Initial Access (Office Word Macro) [FREE LAB ACCESS] Our latest video explores how to emulate FIN6’s initial access techniques by crafting a macro-enabled Word document. This video is part of our adversary emulation series, designed to equip you with the tools and knowledge to plan and execute adversary emulation campaigns. ?? Video Link: https://lnkd.in/ddcPsK8b ?? Practical Labs: This demonstration leverages the MITRE ATT&CK Defender - Adversary Emulation Fundamentals labs, exclusively available on CYBER RANGES. If you’re ready to try it out, check out the platform and follow along! New to CYBER RANGES? Register here: https://lnkd.in/dQJspcKx Adversary Emulation Labs: https://lnkd.in/dz5EHqa6 Here’s what we cover: ? Automating the development of a malicious Word macro using Metasploit. ? Simulating initial access and privilege escalation in a controlled lab environment. ? Setting the stage for the next video, where we’ll dive into Active Directory enumeration and manual VBA macro development for those who prefer a hands-on approach. ?? Why Watch? This video offers actionable insights into replicating FIN6’s tactics, from spear-phishing to privilege escalation. #Cybersecurity #RedTeam #AdversaryEmulation #FIN6 #ThreatIntel #MITREATTACK #Metasploit #CYBERRANGES
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
https://www.youtube.com/
-
?? Red Teamers, Ready to Elevate Your Adversary Emulation Game? ?? Developing an effective adversary emulation plan is essential for crafting realistic and impactful red team operations. Our latest video, "Developing an Adversary Emulation Plan", walks you through every step of the process: ?? Watch the full video here: https://lnkd.in/d_42teG2 ? Selecting a relevant threat actor to emulate, based on industry and geolocation. ? Finding actionable Cyber Threat Intelligence (CTI) to understand adversary behavior. ? Mapping Tactics, Techniques, and Procedures (TTPs) using the MITRE ATT&CK framework. ? Designing scenarios that simulate real-world adversary campaigns. ?? Resource Spotlight: Check out the APT Groups and Operations Directory to explore detailed information about APT groups, their aliases, and campaigns. Start building more accurate emulation plans: https://lnkd.in/dX73H5RV ?? Pro Tip: Use the "APT Groups & Operations" spreadsheet to enhance your red team exercises and threat-informed defense strategies. #Cybersecurity #RedTeam #AdversaryEmulation #APT #ThreatIntel #MITREATTACK
Developing An Adversary Emulation Plan
https://www.youtube.com/
-
Introduction To Advanced Persistent Threats (APTs) Advanced Persistent Threats (APTs) represent some of the most sophisticated and persistent adversaries in the cyber threat landscape. Whether you’re crafting adversary emulation scenarios, running a red team engagement, or developing detection strategies, understanding APTs is critical to staying ahead. ?? Watch our latest video: "Introduction to Advanced Persistent Threats (APTs)" YouTube Video: https://lnkd.in/dmvM4T4C ?? In this video, we explore what APTs are, how they operate, and the complexities of their naming conventions used by leading cybersecurity vendors like CrowdStrike and Mandiant. But we’re not stopping there. To complement the video, we’ve created an invaluable resource for the community: ?? APT Groups and Operations Directory: https://lnkd.in/dX73H5RV This detailed repository categorizes APT groups by geographic region and provides a breakdown of their alternative names (e.g., CrowdStrike vs. Mandiant) and the campaigns attributed to them. ?? How to Use: Watch the video to build your foundational knowledge of APTs. Use the directory to enhance your adversary emulation planning and TTP mapping processes. Let’s keep sharpening our tools. Stay informed. Stay ahead. ???? #Cybersecurity #RedTeam #APT #AdversaryEmulation #ThreatIntelligence #YouTube #HackerSploit #CrowdStrike #Mandiant
Introduction To Advanced Persistent Threats (APTs)
https://www.youtube.com/
-
?? Ready to Level Up Your Red Teaming Game? ?? Pentesters and red teamers, are you looking to break into adversary emulation and take your engagements to the next level? ?? Our latest YouTube video is here to guide you! ?? YouTube Video: https://lnkd.in/dyZETEXu ?? Learn what adversary emulation is, how it differs from traditional red teaming, and why it's a game-changer for replicating real-world threat actors. ?? Get actionable insights to build realistic scenarios and develop tactics that mimic advanced persistent threats (APTs). ?? Whether you're a seasoned red teamer or starting out, this video is packed with tips and techniques to help you refine your craft and stand out in the field. ?? Don't forget to like, share, and subscribe for more content tailored to red teamers like you! #RedTeam #AdversaryEmulation #Pentesting #CybersecurityTraining #ThreatEmulation
Introduction To Adversary Emulation
https://www.youtube.com/
-
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion https://lnkd.in/dsWE6b9Q #redteam #redteaming #infosec #penetrationtesting #linux #hacking #iotsecurity #infosec #cybersec #CybersecurityNews #Security #PenTest #windows #cybersecuritytraining #penetrationtesting #CyberSecurity #Malware #infosecurity #infosec #cybersecurity #cyberattack #infosec #infosecurity #nmap #networksecurity #penetrationtesting #penetrationtest #cybersec #hackers
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
https://www.youtube.com/
-
Red Team Frameworks & Methodologies: https://lnkd.in/eKAdvPHc Hey guys, HackerSploit here back again with another video. This video will introduce you to the various industry-standard frameworks and methodologies used by Red Teamers to plan and orchestrate successful Red Team operations. The slides and written version of this video can be accessed on the HackerSploit Forum: https://lnkd.in/e8XAt_AB #redteam #redteaming #infosec #penetrationtesting #linux #hacking #iotsecurity #infosec #cybersec #CybersecurityNews #Security #PenTest #windows #cybersecuritytraining #penetrationtesting #CyberSecurity #Malware #infosecurity #infosec #cybersecurity #cyberattack #infosec #infosecurity #nmap #networksecurity #penetrationtesting #penetrationtest #cybersec #hackers #bugbounty #ethicalhacking #linux #informationsecurity #hackthebox #pentesting #pentester #cybersecuritytraining #ctf
Red Team Frameworks & Methodologies
https://www.youtube.com/
-
Introduction To Red Teaming: https://lnkd.in/drTrriAd This video will introduce you to red teaming, and explain its origins and adoption in offensive cybersecurity. You will also learn about the key differences between Red Teaming and Penetration Testing. You will also be introduced to the various roles and responsibilities within a red team, including the red team operator and red team lead. Whether you're a beginner or looking to deepen your knowledge, this video provides a comprehensive overview to get you started on your red teaming journey. #redteam #redteaming #infosec #penetrationtesting #linux #hacking #iotsecurity #infosec #cybersec #CybersecurityNews #Security #PenTest #windows #cybersecuritytraining #penetrationtesting #CyberSecurity #Malware #infosecurity #infosec #cybersecurity #cyberattack #infosec #infosecurity #nmap #networksecurity #penetrationtesting #penetrationtest #cybersec #hackers #bugbounty #ethicalhacking #linux #informationsecurity #hackthebox #pentesting #pentester #cybersecuritytraining #ctf
Introduction To Red Teaming
https://www.youtube.com/
-
Hey guys, HackerSploit here back again with another video! https://lnkd.in/dvHeMrAt
HackerSploit Channel Update 2024
https://www.youtube.com/