Articles tagged with: #red-team Clear filter
LockBit Breach: Insights From a Ransomware Group's Internal Data

LockBit Breach: Insights From a Ransomware Group's Internal Data

Compass Security Blog blog.compass-security.com

Something a bit wild happened recently: A rival of LockBit decided to hack LockBit. Or, to put this into ransomware-parlance: LockBit got a post-paid pentest. It is unclear if a ransomware negotiation took place between the two, but if it has, it was not successful. The data was leaked. Now, let's be honest: the dataset is way too small to make any solid statistical claims. Having said that, let's make some statistical claims!

Changing role to AppSec/Red Team Manager

Changing role to AppSec/Red Team Manager

cybersecurity www.reddit.com

I am inheriting a somewhat mature appsec team and red team. I'm coming from a Security Engineering and Automation manager role in the same department and am very technical in the space. I am not technical in AppSec or Development but I am good with Vulnerability Management. While shadowing some calls, I have found myself struggling to keep up in report readouts and calls where a team is disagreeing with a finding. Without becoming a full blown pentester, although I have started with hackthebox,...

In your experience

In your experience

cybersecurity www.reddit.com

Is it more effective to gain experience on a corporate blue team first or to train as a red team/pentester and pursue freelance security assessments and bug bounties immediately? If pursuing freelance pentesting, what channels or platforms do professionals use to find legitimate, submitted by /u/pizzamen64 [link] [comments]

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

Cyber Security News cybersecuritynews.com

A sophisticated technique uncovered where threat actors abuse Amazon Web Services' X-Ray distributed tracing service to establish covert command and control (C2) communications, demonstrating how legitimate cloud infrastructure can be weaponized for malicious purposes. AWS X-Ray, designed to help developers analyze application performance through distributed tracing, has been repurposed by red team researchers into a

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

The Hacker News thehackernews.com

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results are delivered hasn't kept up with today's fast-moving threat landscape. Too often, findings are packaged into static reports, buried in PDFs or spreadsheets, and handed off manually to

selling pentest service

selling pentest service

cybersecurity www.reddit.com

did so much bug bounty and now starting a pentesting service company, but finding difficult to get clients, tired of explaining CISO having SOC2 or ISO will not mean they are secure haha. how do we tackle this.? im good at emails but barely getting reply coz i know cto and ciso get ton of vendor emails every minute submitted by /u/Busy_Mastodon2282 [link] [comments]

Looking for original offensive/red-team project ideas for a personal project

Looking for original offensive/red-team project ideas for a personal project

cybersecurity www.reddit.com

Hi - I'm planning a personal project to sharpen my red‑team / pentesting skills. I want something offensive‑focused , original, and practical - a tool or prototype that would actually help pentesters/red-teamers or non-technical defenders. I'm not looking to build another scanner or report generator. What I'm asking for: Real pain points in red-team/pentest workflows that need better tooling. Research subjects I can dive into to spark an original project idea. One-line project seeds are...

Masters in CS vs. Cybersecurity

Masters in CS vs. Cybersecurity

cybersecurity www.reddit.com

Hello all, apologies for what is probably a redundant question; I will try and keep it short. Background: 22M active duty USAF as a network administrator approaching 4 years experience. I am looking for advice on which masters degree (CS, cybersecurity, etc.) would best benefit my desired career trajectory. I currently work in network/systems administration, however would like to eventually transition to the cybersecurity side of things (NetSec, Red-team, etc.) I currently have my CCNA and plan...

[Nighthawk C2] Automating red-team ops with APIs & WebSockets - practical ideas, safe examples, and discussion

[Nighthawk C2] Automating red-team ops with APIs & WebSockets - practical ideas, safe examples, and discussion

cybersecurity www.reddit.com

Nighthawk C2 exposes JSON-RPC + WebSocket APIs so we can automate triage, event processing, and integrations (alerts, dashboards, OCR pipelines). Link: https://www.nighthawkc2.io/automating-operations/Nighthawk C2 exposes JSON-RPC + WebSocket APIs so you can automate triage, event processing, and integrations (alerts, dashboards, OCR pipelines). Here's a non-promotional summary of what I found useful and some safe, practical automation patterns to discuss. submitted by /u/zensec_official [link]...

What's better for employability in Europe  -  deep web pentest specialization or a broad generalist skillset? (I already have BSCP)

What's better for employability in Europe - deep web pentest specialization or a broad generalist skillset? (I already have BSCP)

cybersecurity www.reddit.com

Hi everyone - looking for honest advice from recruiters, hiring managers, pentesters and red teamers. Quick background: Level: Junior+ / Junior-Mid. Current strength: web pentesting - I feel comfortable but can improve. Weak spot: Windows / Active Directory - needs work. Certification: BSCP (Burp Suite Certified Practitioner) . Goal: land a pentester / red team role in a European company within ~1 year(work experience, but not in a European company). Questions: From the hiring side, which...

[Video] Using WSASS to Dump Credentials & How to Detect It  -  The Weekly Purple Team

[Video] Using WSASS to Dump Credentials & How to Detect It - The Weekly Purple Team

For [Blue|Purple] Teams in Cyber Defence www.reddit.com

Just dropped a new episode of The Weekly Purple Team - this time we're diving into WSASS , a tool designed to extract credentials from memory (similar to classic LSASS attacks). 🔧 We walk through how WSASS works in a red team context, and then flip to the blue side to show how to detect and hunt for this kind of behavior in your environment. 🎥 Watch the video here: https://youtu.be/-8x2En2Btnw 📂 Tool used: https://github.com/TwoSevenOneT/WSASS If you're into offensive tradecraft and defensive...

How to pentest mcp

How to pentest mcp

cybersecurity www.reddit.com

How do we pentest mcp? Like I have seen some programs in hackerone adding mcp inscope, so does anyone has any idea or resources to pentest it? Note it is a public program so anyone can try it submitted by /u/PotentialSenior449 [link] [comments]

Guidance for a First Solo Red Team Operation

Guidance for a First Solo Red Team Operation

cybersecurity www.reddit.com

Hi everyone, I'm preparing to conduct my first Red Team operation, and I will be the sole operator. To ensure the engagement is successful and methodical, I'm looking for foundational advice from experienced professionals. I'm moving beyond theory and into practice, and my goal is to build good habits from day one. Instead of asking about specific tools, I'd like to ask about the principles behind a successful operation. Any insights you have on the following points would be invaluable: Mindset...

Stop reporting zero-impact findings as vulnerabilities

Stop reporting zero-impact findings as vulnerabilities

cybersecurity www.reddit.com

I've been working in security for 6+ years, currently a technical director at Sekurno. The thing that still trips teams up is pentest reports stuffed with "mediums" that don't actually change risk. Missing headers, server banners, rate limits... labeled as vulnerabilities. Devs burn time, trust drops, and the real bugs get buried. My rule of thumb: a vulnerability means threat → exploit path → business impact. If you can't show that line, it's hygiene, not a vuln. A few patterns I keep seeing:...

What Does "Good" Look Like in Red Teaming

What Does "Good" Look Like in Red Teaming

bishopfox.com bishopfox.com

Most red team exercises fail to deliver real value. They check compliance boxes but don't address actual business risks. Learn the difference between good and bad offensive security, plus the strategic framework that transforms red teaming from expense into ROI.

Mini pentesting with reports

Mini pentesting with reports

cybersecurity www.reddit.com

Hey guys, I am an MSP and want to offer free remote mini pentesting as a goodie before offering a contract to show there is a lot to do. Nothing too fancy; wordpress testing, NMAP, OpenVAS and alike. I want to generate a report for the customer afterwards, mostly automated. Now I found Dradis. Of course the customer would need to sign a contract allowing me to do the pentest. Is there something I would need to consider? Is there a better way to do this? submitted by /u/Significant_Oil_8 [link]...