Blue Cell Tools
Defensive Tactics
- How to perform OS Identification Scans
- How to identify Adversary Reconnaissance via Suricata
- How to Detect Meterpreter Sessions on a Network
- How to collect Host Artifacts for Threat Hunting
- How to determine Unique Attack Paths to Key Terrain
Red Cell Tools
Offensive Tactics
- How to enumerate Directories on a Web Server
- How to abuse SUID Bit on Binaries
- How to run Metasploit Auxiliary Scans
- How to exploit SMB V1.0 on Windows Machines
- How to enumerate MS SQL Server Vulnerabilities