Planning Red Team Engagements | Scope, ROE & Reports
HackerSploit Forum
by HackerSploit
2M ago
RED TEAM SCOPE & OBJECTIVES Defining Red Team engagement goals can be difficult and tedious primarily because there needs to be a synthesis between the Red Team and the client. This is especially true for organizations new to Red Teaming. Whether you are on the delivery or receiving end of a Red Team engagement, solid goals must be decided to have a successful Red Team engagement. When analyzing a client’s desired objectives, one key factor to consider is the depth and nature of the engagement. Red Team engagements can be categorized into: Full Simulation/Extended Pentest Adversary Emulat ..read more
Visit website
I need to better understand how reverse proxy works in NGINX
HackerSploit Forum
by pyrezz
2M ago
Lets say I am using ubuntu as my base OS, I install NGINX and NGINX Manager. I would like to use Lets Encrypt and have it automatically renew my SSL cert. I am currently running it from my home, not in the cloud at the moment. How can I set it up so that I can connect external sites (Say my digital ocean container) using this reverse proxy? 1 post - 1 participant Read full topic ..read more
Visit website
Red Team Frameworks & Methodologies
HackerSploit Forum
by HackerSploit
3M ago
A successful Red Team engagement begins with clearly defining the goals/objectives of the engagement with the client. The Red Team is then tasked with planning and orchestrating the engagement based on the pre-defined goals/objectives. It is important to note that Red Team engagement does not focus on the search for vulnerabilities, instead, they target security operations as a whole. The results of a Red Team engagement should highlight the Blue Team’s ability to detect and defend against attacks and where improvements can be made. Red Team engagements should also simulate/emulate new TTPs f ..read more
Visit website
Introduction To Red Teaming
HackerSploit Forum
by HackerSploit
3M ago
Introduction To Red Teaming WHAT IS RED TEAMING? Red Teaming is the process of emulating the Tactics, Techniques & Procedures (TTPs) of real-world threats/APT groups with the goal of measuring the effectiveness and resilience of defenders (Blue Team), employees, processes, and the underlying technology of a target organization. The underlying goal/motive of Red Teaming is to get a better, more holistic understanding of an organization’s ability to detect and defend against adversarial TTPs. Red Teaming is a practice that was adopted by the military, whereby military units are tasked to ope ..read more
Visit website
What is your advice about learn CTFs , what i should know before begin?
HackerSploit Forum
by Haider
3M ago
what is your advice about learn CTFs , what i should know before begin? 1 post - 1 participant Read full topic ..read more
Visit website
Question: i cannot access the blue team course part two anywhere online
HackerSploit Forum
by guythatlovelearning
3M ago
So, I’m watching the blue team playlist and i want to see part 2 but i cannot find it any where, it has memory forensics which I’m highly interested in, any help would be appreciated, a link or a re-upload, it should be accessible through the linode link but that doesn’t work . 2 posts - 2 participants Read full topic ..read more
Visit website
I'm new and need help learning.
HackerSploit Forum
by Overduepractice
3M ago
I need help learning things like cyber security and programming. I’m using Linux Mint and I know a little bit about networking and how to use the Linux terminal. **Any help is appreciated. ** Thank you! 1 post - 1 participant Read full topic ..read more
Visit website
I need help with my network asking if someone will give me advice
HackerSploit Forum
by koypond
3M ago
I’m staying at a hostel so I know the network is compromised I’m new to linux but ran lynis and whats going on is for almost a year someone has been hacking me I want to use windows cause its easy for work stuff but I feel like giving up because i dont know what to do…I try and run kali in vm and hacker takes the image out There are multiple essid with the same name and my computer only shows one available to log onto…There using freeBSD and Gist , and mashups. My bluetooth adapter is not showing anymore and when i plug in a usb it shows 2 show up Ive pen tested myself and it shows all the fac ..read more
Visit website
Installation of wine 64bit
HackerSploit Forum
by user01
3M ago
Hello, i’m trying to install wine with this command “sudo dpkg --add-architecture i386 && apt-get update && apt-get install wine32” but it tells me: "Reading package lists… Done E: Could not open lock file /var/lib/apt/lists/lock - open (13: Permission denied) E: Unable to lock directory /var/lib/apt/lists/ W: Problem unlinking the file /var/cache/apt/pkgcache.bin - RemoveCaches (13: Permission denied) W: Problem unlinking the file /var/cache/apt/srcpkgcache.bin - RemoveCaches (13: Permission denied)" I’m on a 64bit system thanks for helping me 1 post - 1 participant Read full ..read more
Visit website
Ls root nothing shows up
HackerSploit Forum
by user01
3M ago
Hello, i’m trying to show the files in root by doing this command “sudo ls /root” but it does nothing thanks for helping me 1 post - 1 participant Read full topic ..read more
Visit website

Follow HackerSploit Forum on FeedSpot

Continue with Google
Continue with Apple
OR