Yaksas Security
Subscribe
Sign in
Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Adversary Emulation
Latest
Top
PoshC2: A Red Teamer's Notes
A quick reference guide for using PoshC2, a post-exploitation framework, during penetration testing and red teaming engagements.
Sep 29, 2024
•
Yaksas Security
The Three Command and Control Tiers
This post covers the three command and control tiers commonly used during red team and adversary emulation engagements.
Sep 29, 2024
•
Yaksas Security
Introduction to MITRE ATT&CK Framework
This post covers basics of MITRE ATT&CK framework. One of the use cases of ATT&CK is Adversary Emulation exercises.
Sep 29, 2024
•
Yaksas Security
What is Adversary Emulation?
Learn about adversary emulation. This post is part of our course Red Team Adversary Emulation: Mimicking a real-world cyber attack
Sep 29, 2024
•
Yaksas Security
Red Team Operations Attack Lifecycle
The nine-step process of conducting red team and adversary emulation exercises.
Sep 29, 2024
•
Yaksas Security
Red Team Adversary Emulation Lab - Tax First Labz
Red team lab to go along with the course Red Team Adversary Emulation (https://yks.red/RTAE)
Sep 21, 2024
•
Yaksas Security
Red Team Adversary Emulation Course
In this course, you will look at an organization’s security from a real-world adversary perspective
Sep 20, 2024
•
Yaksas Security
Capture the flag - Tax First Labz
Capture the flag lab for the course Red Team Adversary Emulation.
Sep 20, 2024
•
Yaksas Security
Red Team Adversary Emulation Lab - FAQ
Frequently Asked Questions for the Red Team Adversary Emulation Lab
Sep 19, 2024
•
Yaksas Security
Active Directory User Enumeration using PowerView
As a pentester, you can leverage PowerView to find out information about domain users. These six commands will help you in user enumeration.
Jul 8, 2024
•
Yaksas Security
Active Directory Network Recon using PowerView
As a pentester, you can leverage PowerView to find out information about an active directory network. These commands will help you with the network…
Jul 8, 2024
•
Yaksas Security
AD Exploitation using ADSI - Part 1 (Introduction)
AD exploitation using ADSI | This post covers what is ADSI? and how to use it with Powershell to connect to and enumerate Active Directory?
Jul 8, 2024
•
Yaksas Security
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts