Skip to main content

Content Resources > Security

33 resources

Linux Defense Evasion – Hiding Processes | Red Team Series 11-13

In this part of our Hackersploit Security Series we will cover Linux Defense Evasion techniques. We will be taking a look at libprocesshider, and other methods of evading attacks.

Security

Linux Persistence Techniques | Red Team Series 10-13

In this video in our Hackersploit Red Team series, we will cover Linux Persistence Techniques. This is a method of establishing and maintaining access to a remote server using back door or web shell.

Security

Linux Privilege Escalation Techniques | Red Team Series 9-13

In this video in our Hackersploit Red Team Series, we will cover Linux privilege escalation techniques. This includes obtaining root access, and exploiting permissions or binaries to achieve access.

Security

Windows Privilege Escalation Techniques | Red Team Series 8-13

In the eighth video in our series on Red Team Techniques, we will talk about Privilege Escalation Techniques in Windows. We will cover how to bypass UAC and use both Kernel and Token Impersonation Exploits.

Security

Windows Defense Evasion Techniques | Red Team Series 7-12

In the seventh video in our series on Red Team Techniques we will explore Defense Evasion in Windows. We will cover how to use tools to evade Anti-Virus systems, scripting through PowerShell, and more.

Security

Windows Red Team Credential Access Techniques | Red Team Series 6-12

This guide is part of the HackerSploit Red Team series of guides. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include: keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

Security

Windows Red Team Persistence Techniques | Red Team Series 5-12

This guide is part of the HackerSploit Red Team series of guides. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

Security

Linux Red Team Exploitation Techniques | Red Team Series 4-12

This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Linux systems. Techniques used to gain a foothold include targeted spear phishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords.

Security

Windows Red Team Exploitation Techniques | Red Team Series 3-12

This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Windows systems. Techniques used to gain a foothold include targeted spear phishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords.

Security

How to Reset SSH Host Keys when Deploying Linux Templates in Proxmox

In this video, we'll go over how to create a new set of SSH host keys for each instance that you create from an image. Resetting SSH host keys, and making sure that each instance that you set up has different host keys, is vital to server security.

Security

Red Team Recon Techniques | Red Team Series 2-12

The description of the video goes here. Try to be sort of short, and keep it to two complete sentences.

Security

Adversary Emulation with Caldera | Red Team Series 1-12

The description of the video goes here. Try to be sort of short, and keep it to two complete sentences.

Security