Open in app

Sign In

Write

Sign In

Justin Warner
Justin Warner

65 Followers

Home

About

Apr 6, 2021

Using Kaitai Struct to Parse Cobalt Strike Beacon Configs

I have seen a definite uptick in security researchers hunting Cobalt Strike servers, and tweeting/sharing indicators or config data. There are two popular config parsing methods I have seen: the Nmap NSE script written by @notwhickey and the Sentinel One parser by @gal_kristal (yes, I am aware many organizations have…

Beacons

9 min read

Using Kaitai to Parse Cobalt Strike Beacon Configs
Using Kaitai to Parse Cobalt Strike Beacon Configs
Beacons

9 min read


Jul 23, 2018

Do You Miss Being a Red Teamer?

It is a question that gets posed to me pretty frequently: “Do you miss being a red teamer?” If you came all the way to my blog to see the answer, I will save you some time and from reading a couple hundred words — No. The real meaning of…

Red Team

3 min read

Red Team

3 min read


Apr 5, 2017

Infrastructure Diversity — Hunting In Shared Infrastructure

As an attacker, it is all too easy to settle down into a rhythm. That rhythm of operations, the specific techniques and automation involved with conducting offensive work, boiled down to foundational tradecraft decisions that are often reused between campaigns. Why reuse of tradecraft between campaigns? Well, it enables scalable…

Threat Hunting

5 min read

Threat Hunting

5 min read


Jul 5, 2016

Common Ground Part 3: Execution and the People Factor

This is part three of a blog series titled: Common Ground. In Part One , I discussed the background and evolution of red teaming. I dove deep into how it applies to the information security industry and some limitations that are faced on engagements. In Part Two , I discussed…

Pentesting

7 min read

Pentesting

7 min read


Jun 28, 2016

Common Ground: Planning is Key

This is part two of a blog series titled: Common Ground. In , I discussed the backgrounds and evolution of red teaming, diving deep into how it applies to the information security industry and some limitations engagements face. In this part, I will discuss common components of red team planning…

Red Team

12 min read

Common Ground: Planning is Key
Common Ground: Planning is Key
Red Team

12 min read


Jun 24, 2016

Common Ground Part 1: Red Team History & Overview

Over the past ten years, red teaming has grown in popularity and has been adopted across different industries as a mature method of assessing an organization’s ability to handle challenges. With its widespread adoption, the term “red team” has come to mean different things to different people depending on their…

Red Team

12 min read

Red Team

12 min read


May 16, 2016

Creepy User-Centric Post-Exploitation

I love seeing red and blue teams square off during an engagement. It works best if both sides avoid selfish desires and focus on the task at hand; improvement and training is the ultimate goal. A key component of the offensive aspect of this feud is the ability for the…

Red Team

6 min read

Creepy User-Centric Post-Exploitation
Creepy User-Centric Post-Exploitation
Red Team

6 min read


Feb 11, 2016

Empire & Tool Diversity: Integration is Key

Since the release of PowerShell Empire at BSidesLV 2015 by Will Schroeder (@harmj0y) and myself, the project has taken off. I could not be more proud of the community of contributors and users that have rallied together to help us maintain and continue building Empire. Since the project’s release, Matt…

Pentesting

6 min read

Empire & Tool Diversity: Integration is Key
Empire & Tool Diversity: Integration is Key
Pentesting

6 min read


Feb 5, 2016

Remote Weaponization of WSUS MITM

Network attacks (WPAD Injection, HTTP/WSUS MITM, SMB Relay etc.) are a very useful attack vector for adversaries trying to laterally spread, gather credentials or escalate privileges in a semi-targeted manner. This vector is used by known adversaries attempting to penetrate deep into networks, and numerous threat/malware reports have cited tools…

Microsoft

10 min read

Remote Weaponization of WSUS MITM
Remote Weaponization of WSUS MITM
Microsoft

10 min read


Jun 5, 2015

Derivative Local Admin

Intro User hunting is the process of tracking down where users are logged in or have a session in the network. By locating their login or session, you might be able to gain access to that Machine, privesc (if required), and operate in the context of the new user. This is…

Red Team

5 min read

Derivative Local Admin
Derivative Local Admin
Red Team

5 min read

Justin Warner

Justin Warner

65 Followers

Tech: Threat Intel | Photographer @ https://www.justinwarnerphoto.com

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech