Adversary Tactics - Reference Slides
Adversary Tactics - Reference Slides
Adversary Tactics - Reference Slides
2
Useful Resources (cont’d)
• Apache mod_rewrite rules for AV vendors
https://gist.github.com/curi0usJack/971385e8334e189d93a6cb4671238b10
• Scraper for ExpiredDomains.net and BlueCoat to find categorized domains
https://github.com/t94j0/AIRMASTER
• SSL Certificates recon tool https://crt.sh
• Python LNK payload tool
https://gist.github.com/HarmJ0y/ae04dd39cf851c862fff721fdd28f7db
• Active Directory enumeration without PowerShell https://github.com/fdiskyou/hunter
• Execute .NET assemblies through SQL Server https://github.com/sekirkity/SeeCLRly
• Investigating PowerShell Attacks https://www.fireeye.com/content/dam/fireeye-
www/global/en/solutions/pdfs/wp-lazanciyan-investigating-powershell-attacks.pdf
3
Useful Resources (cont’d)
• Mimikatz https://github.com/gentilkiwi/mimikatz •Rattler https://github.com/sensepost/rattler
• PowerLurk https://github.com/Sw4mpf0x/PowerLurk •sRDI https://github.com/monoxgas/sRDI
• RemoteRecon https://github.com/xorrior/RemoteRecon •aquatone https://github.com/michenriksen/aquatone
• Invoke-Obfuscation •Sysinternals https://live.sysinternals.com/
https://github.com/danielbohannon/Invoke-Obfuscation •PSReflect https://github.com/mattifestation/PSReflect
• dnSpy https://github.com/0xd4d/dnSpy •OleViewDotNet
• Red Team Infrastructure Wiki https://github.com/tyranid/oleviewdotnet
https://github.com/bluscreenofjeff/Red-Team- •Hexacorn’s EDR comparison matrix
Infrastructure-Wiki http://www.hexacorn.com/blog/2016/08/07/edr-sheet-
explained/
• DotNetToJScript
https://github.com/tyranid/DotNetToJScript •Hexacorn Beyond Run Key series
http://www.hexacorn.com/blog/2017/01/28/beyond-
• Ruler https://github.com/sensepost/ruler good-ol-run-key-all-parts/
• Koadic https://github.com/zerosum0x0/koadic
•Tracing WMI Activity https://msdn.microsoft.com/en-
• UACMe https://github.com/hfiref0x/UACME us/library/aa826686(v=vs.85).aspx
4
Useful Resources (cont’d)
•https://blog.harmj0y.net/ - Active Directory, red teaming
•https://enigma0x3.net/ - Lateral movement, persistence
•https://wald0.com/ - BloodHound, graph theory
•https://posts.specterops.io/ - cross post for all SpecterOps blogs
•http://www.exploit-monday.com/ - Windows internals, exploitation
•http://subt0x10.blogspot.com/ - “Trusted Things That Execute”
•http://adsecurity.org – Active Directory reference
•http://www.invoke-ir.com/ - PowerShell forensics and defense
5
Useful Resources (cont’d)
•BloodHound Slack https://bloodhoundhq.slack.com/
•Invites: https://bloodhoundgang.herokuapp.com/
•PowerShell Empire Slack https://adaptiveempire.slack.com/
•Invites: http://adaptiveempire.herokuapp.com/
•SpecterOps Whitepapers
•https://specterops.io/resources/research-and-development