Skip to content

Latest commit

 

History

History
99 lines (86 loc) · 3.94 KB

attack-tools-resources.md

File metadata and controls

99 lines (86 loc) · 3.94 KB

Common Tools Used by Adversaries

Study these tools to find new ways to discover/defend against.

Discovery (Passive)

Stuff you probably won't see on your network, but could use "against yourself"

Google Dorking

  • yourdomain.com (site:amazonaws.com | site:blob.core.windows.net | site:digitaloceanspaces.com)
  • yourdoamin.com (site:pastebin.com | site:paste2.org | site:paste.bradleygill.com | site:pastie.org | site:dpaste.org)
  • "your company" site:linkedin.com (intitle:"Service Desk" | intitle:"Desktop Support" | intitle:"Security Engineer" | intitle:"Help Desk")

Breach Databases

Discovery (Active)

You might see some of this

Credential Access

Attack Demonstrations

Open Source Attacker Simulation Tools

    • Implementation attack, unlikely to be patched traditionally.