Published inR3d Buck3TPayload Delivery with Azure Static Website and IPFS DropperWeaponizing InterPlanetary File System and Azure SitesMay 22May 22
Published inR3d Buck3TConfigure Fireprox for IP Rotation using AWS API GatewayUnlock the power of the AWS API gateway with Fireprox configurationMay 13May 13
Published inInfoSec Write-upsRed Teaming with Azure: Building C2 Infrastructure with Azure VMsA Step-by-Step Guide to Deploying C2 VMsMay 10May 10
Published inR3d Buck3TAdding Certificates to Postman & Burp Suite for API TestingTesting APIs with Certificate-based authenticationApr 30Apr 30
Published inInfoSec Write-upsExploiting Misconfigurations in Windows Service PermissionsA Closer Look at Common Misconfigurations in Windows Service Permissions for Privilege EscalationJan 16Jan 16
Published inR3d Buck3TRed Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 RedirectorsEvading Detection: Obfuscating C2 Infrastructure with Azure FrontDoorJan 11Jan 11
Published inR3d Buck3TAbusing Dynamic Groups in AzureAD [Part 1]Leveraging Dynamic Groups for Elevated PrivilegesJan 4Jan 4
Published inR3d Buck3TRed Teaming in the Cloud: Installing Mythic C2 on Azure VMC2 Deployment and Operations — InfrastructureDec 26, 2023Dec 26, 2023
Published inR3d Buck3TRed Teaming in the Cloud: Deploying Azure VMs for C2 InfrastructureA Guide to Deploying Red Team Infrastructure on AzureDec 15, 2023Dec 15, 2023
Published inInfoSec Write-upsElevating Privileges with SeBackupPrivilege on WindowsOnce we gain initial access to a system during an internal penetration testing assessment, the next step is to escalate privileges in order…Dec 7, 2023Dec 7, 2023