RT @Bugcrowd
π¨ International Women's Day!
As women continue to establish a stronger presence in cyber, we feel honored to feature a #redteamer, #bugbountyhunter, and powerful female in this monthβs researcher spotlight. π‘
#redteamer #bugbountyhunter #iwd2023 #embraceequality
#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai #video #c2 #csharp #inmemory #redteam #pentest
now i want to share something for red-teaming via "Chatgpt" or "YOUdotCOM" as Security Researcher you can see with very simple trick you can find very useful codes here "YOU.COM" which is useful for #pentester or #redteamer , in this case i searched this "write server-side code in C# for/to get bytes over port 8080 and get context" or something like that , and i had this result by #AI so with little bit changing code i made my very simple Sever-Side #C2 only with (50-60 lines server side code), as you can see with very simple code via "Chatgpt" or you-dot-com you can make your own simple C2 Server core codes (networking) or ...
New Video for New codes, this Project is more than 60 lines ;D
Video: Simple C2 server by C# , "Using Chat + AI for C2 Network Core codes and ... make this simple C2 server in [1 hour] with AI help"
#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai #video #c2 #csharp #inmemory #pentest #pentester #redteamer
#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai
in last post i talked about blue-teaming, now i want to share something for red-teaming via "Chatgpt" or "YOUdotCOM" as Security Researcher you can see with very simple trick you can find very useful codes here "YOU.COM" which is useful for #pentester or #redteamer , in this case i searched this "write server-side code in C# for/to get bytes over port 8080 and get context" or something like that , and i had this result by #AI so with little bit changing code i made my very simple Sever-Side C2 only with (50-60 lines server side code), as you can see with very simple code via "Chatgpt" or you-dot-com you can make your own simple C2 Server core codes (networking) or ... but in this case my code executed in server side but i can change that then instead server side my CMD will run in Client-side & vice versa ;D, so as #Penester / #Redteamer and #blueteamer this will help you a lot , also this will be useful for Cyber security Instructors to learn new things better/faster also teaching them better etc
i wrote this code only in 10 mins , because i created my own C2 server with some techniques like this in C# but my core code in background worked with Async Methods and this code almost is similar to my core codes in my own C2 which i created 2-3 months ago so i made this code very fast because i had experience for working with them, but probably for you, this will take time more than 10 mins ;), maybe not, anyway as you can see for learning cyber security things , these platforms are awesome so this one was simple Example for Red-teaming
#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai #pentester #redteamer #penester #blueteamer
those Cyber Security guys which called itself #pentester or #Redteamer or #SecurityResearcher "just because" they are in university (learning something As [basics ;D more often] or academic things or out-of-date things ;D) and they "did not have any Experience" in Cyber Security Fields (even 1 year) and some of them even did not have any good/unique/new Cyber Security Research or tools/codes (which shared before to public).
and yeah we call them beginner "geniuses" in cyber security lol
Vs
those Cyber Security Guys which they have at least 3-5 years experience of learning real/new/unique things in these fields like #penetrationtesting or #redteaming or #securityresearch .
believe me your academic things are "Bullshit" and your instructors did not have updated content , they even don't have good viewpoint for cyber security fields like Penetration test or ... ,more often they don't have any experience of working with Offensive tools like Modern C2 servers, they don't know how you can write Offensive Codes like Writing #C2 server/agent (and why should do that) or they don't know how you can writing Offensive codes for bypassing #avs or #EDRs or #bypassing other things ... you don't know about these things or a lot other things which you should learn them outside of university "by yourself".
you can learn these things from #infosec #communities (with read Articles or Learn Courses which shared Publicly or Privately by #SecurityResearchers and #Pentesters or #redteamers or #blueteamers) and you need at least 2-3 years experiences for learn these new things.
Some guys think if you know all tools in Kali linux then you can call yourself #Pentester or Red-teamer, which is not true "geniuses".
Penetration testing is not about Tools , its about background "concepts" of tools omfg "remember this". (its about logic behind tools)
#pentester #redteamer #securityresearcher #penetrationtesting #redteaming #securityresearch #c2 #avs #edrs #Bypassing #infosec #communities #securityresearchers #pentesters #redteamers #blueteamers
Guess it's about time I do a #introduction
I go by ch33z_plz, I am a #RedTeamer/Penetration tester. I don't post much as I have little anxiety about it, but I will try to do more on here. Outside of InfoSec, I am interested in hobbies such as sculpting, skydiving, adventures with my dogs, getting tattooed, traveling, and of course eating all the #cheese π§
#introduction #redteamer #cheese
Hey #RedTeamer βs - nows a great time to use the old #birdsite as a #C2 server - the admins are asleep (under their desks)
Hey #RedTeamer βs - nows a great time to use the old birdsite as a C2 server - the admins are asleep (under their desks)
Any #redteamer ever use ECS health checks as a persistence mechanism? They'll execute arbitrary shell (on purpose) and in my experience tend to be a monitoring blind spot.
https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_HealthCheck.html
@payloadartist The #bugbounty tag hasn't seen as much action as #infosec or #cybersecurity. The #redteam and #redteamer tags get some love. I confess I don't watch the #blueteam tag.
#bugbounty #infosec #cybersecurity #redteam #redteamer #blueteam
Earlier this year I did a #hack100days run. I got it done after a couple of stumbles and during that time I got a new gig as a #redteamer. Also managed to start a course, but not finish. Plus, with #mastodon being a new shiny, I need to refocus. Time for another run. Stay tuned... #infosec #CoSoSec
#hack100days #redteamer #mastodon #infosec #cososec