<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Red Team on System Overlord</title><link>https://systemoverlord.com/tags/red-team.html</link><description>Recent content in Red Team on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Tue, 14 Jul 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/red-team/index.xml" rel="self" type="application/rss+xml"/><item><title>Raspberry Pi as a Penetration Testing Implant (Dropbox)</title><link>https://systemoverlord.com/2020/07/14/raspberry-pi-as-a-penetration-testing-implant.html</link><pubDate>Tue, 14 Jul 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/07/14/raspberry-pi-as-a-penetration-testing-implant.html</guid><description>&lt;p&gt;&lt;a href="https://www.amazon.com/Raspberry-Model-2019-Quad-Bluetooth/dp/B07TC2BK1X/ref=as_li_ss_il?cv_ct_cx=raspberry+pi&amp;amp;dchild=1&amp;amp;keywords=raspberry+pi&amp;amp;pd_rd_i=B07TC2BK1X&amp;amp;pd_rd_r=cf3c4a78-81c5-4c9a-921f-9c70bae2796e&amp;amp;pd_rd_w=XB1nE&amp;amp;pd_rd_wg=PG6Eq&amp;amp;pf_rd_p=1da5beeb-8f71-435c-b5c5-3279a6171294&amp;amp;pf_rd_r=6XKT1T3E2254DKNEXTAY&amp;amp;psc=1&amp;amp;qid=1594437202&amp;amp;sr=1-1-70f7c15d-07d8-466a-b325-4be35d7258cc&amp;amp;linkCode=li3&amp;amp;tag=systemovecom-20&amp;amp;linkId=cf0fb5b6f95cfb61bff474270a0b5ea1&amp;amp;language=en_US"&gt;&lt;img src="https://ws-na.amazon-adsystem.com/widgets/q?_encoding=UTF8&amp;amp;ASIN=B07TC2BK1X&amp;amp;Format=_SL250_&amp;amp;ID=AsinImage&amp;amp;MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;WS=1&amp;amp;tag=systemovecom-20&amp;amp;language=en_US" alt="Raspberry Pi 4"&gt;{:.left .amzimg}&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Sometimes, especially in the time of COVID-19, you can&amp;rsquo;t go onsite for a
penetration test. Or maybe you can only get in briefly on a physical test, and
want to leave behind a dropbox (literally, a box that can be &amp;ldquo;dropped&amp;rdquo; in place
and let the tester leave, no relation to the file-sharing company by the same
name) that you can remotely connect to. Of course, it could also be part of the
desired test itself if incident response testing is in-scope &amp;ndash; can they find
your malicious device?&lt;/p&gt;
&lt;p&gt;In all of these cases, one great option is a small single-board computer, the
best known of which is the &lt;a href="https://amzn.to/3fl8jSn"&gt;Raspberry Pi&lt;/a&gt;. It&amp;rsquo;s
inexpensive, compact, easy to come by, and very flexible. It may not be perfect
in every case, but it gets the job done in a lot of cases.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ll use this opportunity to discuss the setups I&amp;rsquo;ve done in the past and the
things I would change when doing it again or alternatives I considered. I hope
some will find this useful. Some familiarity with the Linux command line is
assumed.&lt;/p&gt;</description></item><item><title>So You Want a Red Team Exercise?</title><link>https://systemoverlord.com/2020/04/17/so-you-want-a-red-team-exercise.html</link><pubDate>Fri, 17 Apr 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/04/17/so-you-want-a-red-team-exercise.html</guid><description>&lt;p&gt;I originally wrote this for work, where we get a lot of requests to &amp;ldquo;Red Team&amp;rdquo;
&lt;em&gt;something&lt;/em&gt;. In a lot of these cases, a white box security review or other form
of security testing is more appropriate. Because I&amp;rsquo;d heard through the
grapevine that other Red Teams struggle with the same issues, I wanted to make
it available publicly. Thanks to my management for their support and permission
to take this public!&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;d like to use or adapt this within your organization, feel free, but
please give credit to the Google Red Team.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;We frequently get requests to perform Red Team engagements on various products &amp;amp;
services around our company. These requests often have misconceptions about the
services our team provides. This document is intended to help those seeking a
Red Team engagement have a better understanding of what we do, how we do it, and
why we do it the way we do, and how to engage with us for optimal effectiveness.&lt;/p&gt;</description></item><item><title>Passing Android Traffic through Burp</title><link>https://systemoverlord.com/2014/07/13/passing-android-traffic-through-burp/</link><pubDate>Sun, 13 Jul 2014 20:57:18 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/07/13/passing-android-traffic-through-burp/</guid><description>&lt;p&gt;I wanted to take a look at all HTTP(S) traffic coming from an Android device, even if applications made direct connections without a proxy, so I set up a transparent Burp proxy. I decided to put the Proxy on my Kali VM on my laptop, but didn&amp;rsquo;t want to run an AP on there, so I needed to get the traffic to there.&lt;/p&gt;
&lt;h3 id="network-setup"&gt;Network Setup&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/wifitap.png" alt="Network Topology Diagram"&gt;&lt;/p&gt;
&lt;p&gt;The diagram shows that my wireless lab is on a separate subnet from the rest of my network, including my laptop. The lab network is a NAT run by IPTables on the Virtual Router. While I certainly could&amp;rsquo;ve ARP poisoned the connection between the Internet Router and the Virtual Router, or even added a static route, I wanted a cleaner solution that would be easier to enable/disable.&lt;/p&gt;</description></item><item><title>Weekly Reading List for 5/23/14</title><link>https://systemoverlord.com/2014/05/23/weekly-reading-list-for-52314/</link><pubDate>Fri, 23 May 2014 07:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/23/weekly-reading-list-for-52314/</guid><description>&lt;p&gt;###Radare2 Book
Maijin on GitHub is in the process of putting together an &lt;a href="https://radare.gitbooks.io/radare2book/"&gt;online book for Radare2&lt;/a&gt;. I&amp;rsquo;ve been looking for a good resource for using Radare2, and this is a great start.&lt;/p&gt;
&lt;p&gt;###Reverse Engineering for Beginners
Dennis Yurichev has a &lt;a href="http://yurichev.com/RE-book.html"&gt;free eBook on Reverse Engineering&lt;/a&gt;. I haven&amp;rsquo;t gotten through it yet, but it looks interesting, and you can&amp;rsquo;t beat the price.&lt;/p&gt;
&lt;p&gt;###Hacker Playbook
Finally, I finished up &lt;a href="http://www.amazon.com/gp/product/1494932636/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494932636&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Hacker Playbook: Practical Guide To Penetration Testing&lt;/a&gt; this week. You can find &lt;a href="https://systemoverlord.com/2014/05/21/book-review-the-hacker-playbook/"&gt;my full review here&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Book Review: Red Team Field Manual</title><link>https://systemoverlord.com/2014/05/02/book-review-red-team-field-manual/</link><pubDate>Fri, 02 May 2014 15:24:27 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/02/book-review-red-team-field-manual/</guid><description>&lt;p&gt;I recently picked up a copy of the &lt;a href="http://www.amazon.com/gp/product/1494295504/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494295504&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20&amp;amp;linkId=VUHBPTAFLWN7MNBT"&gt;Red Team Field Manual&lt;/a&gt; on Amazon after hearing good things from a few people in the industry. It&amp;rsquo;s information dense, basically a concatenation of cheat sheets for everything you&amp;rsquo;d want to do during a pentest. I&amp;rsquo;m mostly a Linux/Unix guy, and given my role on an internal red team for a mostly Linux company, I don&amp;rsquo;t do a lot of Windows. However, I recently had an engagement where we were targeting Windows, and I wish I&amp;rsquo;d had the RTFM handy then: there are a number of great pointers for Windows that I could&amp;rsquo;ve leveraged to make my engagement go more smoothly. Additionally, the book provides coverage for other platforms, like Cisco IOS, and for various scripting situations in Powershell, Python, or even &lt;a href="http://www.secdev.org/projects/scapy/"&gt;Scapy&lt;/a&gt;.&lt;/p&gt;</description></item></channel></rss>