• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells from above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation

Offense

Pretexting: Your Targets Want to, They Just Don’t Know it Yet

April 29, 2016 By Jeremy

When conducting a social engineering engagement, be it in person or remote, your pretext can mean life or death for your engagement. First off, let's define what a pretext is. A pretext is your story. Who you are, the company you work for, your purpose, even down to how many kids you have, their names, the car you drive, etc. Depending how far you need to go, having details ... READ MORE

Intro to OSINT

April 1, 2016 By Bryan

*All images in this post were found using publicly available sources and should be used for educational purposes only One of the best things in the IT community is Open Source Software. Open source software is something where the a company develops a piece of software and then makes the source code publicly available, allowing anyone to look and manipulate the code. This has ... READ MORE

Do that Phish: King Phisher Video Guides

March 2, 2016 By Erik

The Importance of Phishing Over the last few years, trending has emerged that clearly indicates social engineering, specifically phishing, is the most consistently reliable attack vector through which hackers gain access to target organizations. Given the non-technical, weak-link factor involved in responding to a well crafted phishing attack, how can organization best combat ... READ MORE

Create an Encrypted Leave-Behind Device

February 15, 2016 By Andy

Consider this scenario:  You've breached the physical perimeter of the target organization.  Once inside, you need to establish some means of remote network access, whether for yourself or your teammates waiting on the outside.  In this example, this takes the form of a device you plug in to an unattended network jack within the target organization. Whether you call this ... READ MORE

Scripting RDP for Pillaging and Potato

January 18, 2016 By Andy

Previous posts on the WarRoom have addressed expediting the use of remote desktop to facilitate pillaging.  This post explores scripting commands through an RDP client to serve that same purpose. The end result is one-liner that will log in to a remote system, attach a local directory, execute a script, and save the output to that same local directory, provided the attacker has ... READ MORE

Let’s Hack! Part 2: Using Certificates From “Let’s Encrypt”

December 30, 2015 By Jeff

This is the second post of a two-part series, so if you haven't read part one yet, stop reading, and go do that first.  Those that have followed through the first post will have installed the Let's Encrypt client and obtained their first certificate.  Now lets take a look at how to leverage this certificate for some offensive purposes.  This post will walk through using the ... READ MORE

Let’s Hack! Part 1: Using Certificates From “Let’s Encrypt”

December 29, 2015 By Jeff

In case you haven't heard, in early December 2015, Let's Encrypt entered Public Beta, meaning that anyone can get a certificate issued by the Let's Encrypt Certificate Authority without the need for an invite.  If you aren't familiar with the Let's Encrypt project, you should check out their site.  I can't really sum it up any better than they did already, so to quote them, ... READ MORE

Phishing for Days: Utilizing the King Phisher Calendar Invite

November 17, 2015 By Jeremy

templates

With the upcoming release of King Phisher v1.1, there will come a new way to Phish through calendar invites. "Why calendar invites?" you might ask. Well, when you get a typical calendar invite, how likely are you to thoroughly read through it? People tend to check the sender and, maybe, their availability and then accept. Only when it's time for the meeting do most ... READ MORE

Launch rdesktop from Metasploit

October 26, 2015 By Andy

I often resort to remote desktop sessions when pillaging or attempting lateral escalation.  Remote desktop provides an easy way to look for important data, get an idea of what applications are in use, run scripts or programs, and transfer data between my host and the target system.  Since the Windows “Remote Desktop Connection” program keeps track of IP addresses and makes it ... READ MORE

Metasploit Module of the Month – enum_ad_computers

September 25, 2015 By Andy

Summer has officially ended and Autumn is setting in. As the leaves begin to fall and September draws to a close, it’s a perfect time to sit back and reflect on the metasploit modules that filled our Summer months with joy. In the third installment of our “Module of the Month” series we examine enum_ad_computers, a post-exploitation module that combines the flexibility of LDAP ... READ MORE

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 4
  • Go to page 5
  • Go to page 6
  • Go to page 7
  • Go to page 8
  • Go to page 9
  • Go to Next Page »

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 10.9k views
  • Sophos UTM Home Edition – 3 – The Setup 10.8k views
  • Leveraging MS16-032 with PowerShell Empire 10k views
  • Bypassing Gmail’s Malicious Macro Signatures 9.8k views
  • How to Bypass SEP with Admin Access 8.9k views

Footer

  • RSS
  • Twitter
  • Tools
  • About
  • RSM US LLP

+1 800 903 6264

1 S Wacker Dr Suite 800
Chicago, IL 60606

Copyright © 2023 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.