Advertisement Β· 728 Γ— 90
#
Hashtag
#VolkExplains
Advertisement Β· 728 Γ— 90

But instead of try multiple account against one account, we try a few passwords against ALL accounts. That's how password spraying works.

It's okay! Go change your password if you need to. πŸ™‚πŸΊ

#VolkExplains

1 0 0 0

We were able to take full DNS control of *.staff[.]example[.]com, and create our own user@staff[.]example[.]com email addresses.

That made our phishing engagements a piece of cake!

#VolkExplains 🐺

1 0 0 0

🐺 Forgotten project staging
🐺 Forgotten IPs
🐺 Active hosts that are no longer monitored

This is where we usually find the vulns!

#VolkExplains

0 0 0 0

Simple steps:

1. Win + R.
2. Ctrl + V.
3. Enter.

Nothing felt risky, so they followed along without thinking.

Nothing crashed or popped. Just like that, we got in

#HackingStories #VolkExplains

0 0 0 0

- AD User Object
- Printer
- Cert Template

☝️ Some of the most frustrating examples.

Sometimes the best defence is letting the attacker believe they succeeded. 🐺

#VolkExplains

0 0 0 0
Post image

Everyone thinks attackers start by cracking passwords. Most of the time, we don’t. 🐺

We relay NTLM authentication instead.

You authenticate to one system β†’ we relay that authentication attempt to another system.

No passwords needed.

#VolkExplains

0 0 0 0
Post image

Do you think your SIEM alerts will catch a brute force attack?

Some of the ways to try and remain undetected:

🐺 Low-and-slow attempts
🐺 Valid Usernames.
🐺 Distributed IPs

If you are waiting for a spike in the dashboard it may never come.

#VolkExplains

0 0 0 0