Threat Express
  • No menu assigned
  • No menu assigned!
Oct 09
5

MetaTwin – Borrowing Microsoft Metadata and Digital Signatures to “Hide” Binaries

By Joe Vest | IOC Management, PowerShell, Red Teaming, Tool | No Comments

Overview A twitter post by Casey Smith (@subtee) inspired me to update a tool written by Andrew Chiles (@andrewchiles) and I a few years ago. During a Red Team engagement, it…

Read More
Sep 21
2

Install BloodHound on Ubuntu

By Joe Vest | Network Defense, Red Teaming | No Comments

This post is intended as a quick reference guide to install Bloodhound on an Ubuntu system. This is heavily based on https://popped.io/setting-up-bloodhound-on-debian-jessie/ with a few tweaks. Install Ubuntu Install Ubuntu as…

Read More
Jun 06
2

Converting Cobalt Strike profiles to Apache mod_rewrite .htaccess files to support HTTP C2 Redirection

By Joe Vest | Cobalt Strike, Red Teaming | No Comments

This was heavily based on the work by Jeff Dimmock @bluescreenofjeff (Jeff, thanks for all your great work !!!) Creating a Cobalt Strike mod_rewrite .htacces file is easy, but I’m…

Read More
May 14
2

Empire – Modifying Server C2 Indicators

By Andrew Chiles | PowerShell, Red Teaming | No Comments

Overview This post is intended as a follow-on to Jeff Dimmock’s detailed write-up on creating communication profiles for Empire. Empire 1.6’s “DefaultProfile” setting for modifying C2 indicators doesn’t directly allow…

Read More
May 02
2

Invoke-HostEnum – A PowerShell Host Situational Awareness Tool

By Andrew Chiles | PowerShell, Red Teaming, Tool | No Comments

Overview During a Red Team engagement, performing detailed Situational Awareness (SA) or enumeration on initial and subsequent host compromises is vital. Every good pen-tester or red teamer has their list of go-to…

Read More
Mar 01
5

Leveraging Expired Domains for Red Team Engagements

By Andrew Chiles | Red Teaming, Tool | No Comments

Overview Domain name selection is an important aspect of preparation for phishing scenarios, penetration tests, and especially Red Team engagements. It is increasingly common to be faced with web filtering in…

Read More
Dec 05
4

Slack Notifications for Cobalt Strike

By Andrew Chiles | Cobalt Strike, Red Teaming | No Comments

We’ve seen several great incoming agent/shell notification mechanisms for Metasploit and Empire recently and the utility of being notified when new shells appear is without question. This is especially true when conducting…

Read More
Oct 03
3

Web shells as a covert channel – SubShell & TinyShell

By Joe Vest | Network Defense, Penetration Testing, Red Teaming, Webshell | No Comments
Web applications continue to be a valuable door for attackers to use to gain remote access to a network.  If a web application is compromised, the webserver itself can be used...
Read More
Sep 30
4

New Information Security and Red Teaming Blog “Threat Express” by MINIS

By Andrew Chiles | Penetration Testing, Red Teaming | No Comments

Welcome to the Threat Express information security blog by the Red Team at MINIS LLC. The primary website remains http://minis.io, but this is our new platform for the release of security research, tools, and…

Read More

Recent Posts

  • MetaTwin – Borrowing Microsoft Metadata and Digital Signatures to “Hide” Binaries
  • Install BloodHound on Ubuntu
  • Converting Cobalt Strike profiles to Apache mod_rewrite .htaccess files to support HTTP C2 Redirection
  • Empire – Modifying Server C2 Indicators
  • Invoke-HostEnum – A PowerShell Host Situational Awareness Tool

Follow our Authors

Joe Vest @joevest
Andrew Chiles @andrewchiles
James Tubberville @minis_io

Archives

  • October 2017
  • September 2017
  • June 2017
  • May 2017
  • March 2017
  • December 2016
  • October 2016
  • September 2016
Follow us on Twitter Follow

Archives

  • October 2017
  • September 2017
  • June 2017
  • May 2017
  • March 2017
  • December 2016
  • October 2016
  • September 2016

Tags

Aggressor AV evasion Cobalt Strike offensive powershell Penetration Testing Red Team red teaming SANS SEC564 web shell

© 2017 Threat Express.

  • About

Tags

Aggressor AV evasion Cobalt Strike offensive powershell Penetration Testing Red Team red teaming SANS SEC564 web shell

Archives

  • October 2017
  • September 2017
  • June 2017
  • May 2017
  • March 2017
  • December 2016
  • October 2016
  • September 2016