Published inR3d Buck3TPayload Delivery with Azure Static Website and IPFS DropperWeaponizing InterPlanetary File System and Azure SitesMay 22, 2024May 22, 2024
Published inR3d Buck3TConfigure Fireprox for IP Rotation using AWS API GatewayUnlock the power of the AWS API gateway with Fireprox configurationMay 13, 2024May 13, 2024
Published inInfoSec Write-upsRed Teaming with Azure: Building C2 Infrastructure with Azure VMsA Step-by-Step Guide to Deploying C2 VMsMay 10, 2024May 10, 2024
Published inR3d Buck3TAdding Certificates to Postman & Burp Suite for API TestingTesting APIs with Certificate-based authenticationApr 30, 2024Apr 30, 2024
Published inInfoSec Write-upsExploiting Misconfigurations in Windows Service PermissionsA Closer Look at Common Misconfigurations in Windows Service Permissions for Privilege EscalationJan 16, 2024Jan 16, 2024
Published inR3d Buck3TRed Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 RedirectorsEvading Detection: Obfuscating C2 Infrastructure with Azure FrontDoorJan 11, 2024Jan 11, 2024
Published inR3d Buck3TAbusing Dynamic Groups in AzureAD [Part 1]Leveraging Dynamic Groups for Elevated PrivilegesJan 4, 2024Jan 4, 2024
Published inR3d Buck3TRed Teaming in the Cloud: Installing Mythic C2 on Azure VMC2 Deployment and Operations — InfrastructureDec 26, 2023Dec 26, 2023
Published inR3d Buck3TRed Teaming in the Cloud: Deploying Azure VMs for C2 InfrastructureA Guide to Deploying Red Team Infrastructure on AzureDec 15, 2023Dec 15, 2023
Published inInfoSec Write-upsElevating Privileges with SeBackupPrivilege on WindowsOnce we gain initial access to a system during an internal penetration testing assessment, the next step is to escalate privileges in order…Dec 7, 2023Dec 7, 2023