<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Riccardo Ancarani - Red Team Adventures</title>
    <description>A blog for random thoughts. Sometimes for infosec as well.</description>
    <link>https://riccardoancarani.github.io/</link>
    <atom:link href="https://riccardoancarani.github.io/feed.xml" rel="self" type="application/rss+xml" />
    
      <item>
        <title>Attacking an EDR - Part 3</title>
        <description>
          All good things must come to an end - 
          Introduction DISCLAMER: This post was done in collaboration with Devid Lana. You can find his blog here: https://her0ness.github.io In this third and last part of this series, we will dig deeper in the EDR’s update process and uncover some logic flaws that, ultimately, led us to the complete disarmament of...
        </description>
        <pubDate>Tue, 07 Nov 2023 00:00:00 -0800</pubDate>
        <link>https://riccardoancarani.github.io/2023-11-07-attacking-an-edr-part-3/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2023-11-07-attacking-an-edr-part-3/</guid>
      </item>
    
      <item>
        <title>Attacking an EDR - Part 2</title>
        <description>
          For less fun but even more profit - 
          Introduction - Where we left off DISCLAMER: This post was done in collaboration with Devid Lana. You can find his blog here: her0ness - Attacking an EDR Part 2 Continuing from our last research, we pursued the exploration of the attack surface of the EDR solution under our scrutiny, STRANGETRINITY....
        </description>
        <pubDate>Thu, 14 Sep 2023 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2023-09-14-attacking-an-edr-part-2/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2023-09-14-attacking-an-edr-part-2/</guid>
      </item>
    
      <item>
        <title>Attacking an EDR - Part 1</title>
        <description>
          For some fun and a fair bit of profit - 
          Introduction DISCLAMER: This post was done in collaboration with Devid Lana. You can find his blog here: https://her0ness.github.io This post is the first of what - we hope - will be a long series of articles detailing some common flaws that can be found on modern EDR products. By no...
        </description>
        <pubDate>Thu, 03 Aug 2023 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2023-08-03-attacking-an-edr-part-1/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2023-08-03-attacking-an-edr-part-1/</guid>
      </item>
    
      <item>
        <title>Mockingjay - What is old is new again</title>
        <description>
          Riding the hype train to see if we can get something useful out of it - 
          Mockingjay - What is old is new again There has been quite a lot of rumor recently around the release of a piece of research that discuss a new (?) process injection technique that evades EDRs (what does that even mean?). For reference, these are the blog post I am...
        </description>
        <pubDate>Mon, 31 Jul 2023 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2023-07-31-mockingjay-what-is-old-is-new-again/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2023-07-31-mockingjay-what-is-old-is-new-again/</guid>
      </item>
    
      <item>
        <title>Random Notes on Task Scheduler Lateral Movement</title>
        <description>
          Putting some sunscreen - 
          Introduction File Replacement Task Replacement COM Handlers Detection Evasion References Introduction Reading FireEye’s UNC2452 writeup, I started to think about how to emulate them in purple teaming exercises. Despite the supply-chain bit is still a bit out of my reach, I noticed an interesting lateral movement vector that was used...
        </description>
        <pubDate>Mon, 25 Jan 2021 00:00:00 -0800</pubDate>
        <link>https://riccardoancarani.github.io/2021-01-25-random-notes-on-task-scheduler-lateral-movement/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2021-01-25-random-notes-on-task-scheduler-lateral-movement/</guid>
      </item>
    
      <item>
        <title>Following Donut Crumbs</title>
        <description>
          The small traces left by donut shellcode - 
          Intro Observations In-Memory PE AMSI Bypass Intro To deal with some rainy Sunday depression I decided to investigate how Donut operates in memory and to see what traces it leaves (if any). I’ve been using Donut for quite some time, and I find it extremely useful from an operator’s perspective...
        </description>
        <pubDate>Sat, 10 Oct 2020 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2020-10-10-donut-crumbs/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2020-10-10-donut-crumbs/</guid>
      </item>
    
      <item>
        <title>Hunting for Skeleton Key Implants</title>
        <description>
          
          Introduction Attack Execution Detection Other Detections and Indicators References Introduction During a recent presentation I examined various ways of persisting within Active Directory (AD) and how every technique can be detected, using both intrinsic IoC of the specific technique or tooling default behaviour. One of the analysed attacks was the...
        </description>
        <pubDate>Sat, 08 Aug 2020 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2020-08-08-hunting-for-skeleton-keys/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2020-08-08-hunting-for-skeleton-keys/</guid>
      </item>
    
      <item>
        <title>Hunting for Impacket</title>
        <description>
          
          Introduction Tools secretsdump.py wmiexec.py dcomexec.py Final Words Introduction During an attack, lateral movement is crucial in order to achieve the operation’s objectives. Primarly, two main strategies exist that would allow an attacker to execute code or exfiltrate data from other hosts after obtaining a foothold within an environment: Operate from...
        </description>
        <pubDate>Sun, 10 May 2020 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2020-05-10-hunting-for-impacket/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2020-05-10-hunting-for-impacket/</guid>
      </item>
    
      <item>
        <title>Attacking Insecure ELK Deployments</title>
        <description>
          Playing Cat and Mouse With The Blue Team - 
          Introduction Nowadays, we see a continuous increase of the adoption of the Elasticsearch Logstash Kibana (ELK) stack for security monitoring purposes. The functionalities of the ELK stack fit nicely the purpose of a SIEM; in fact, within few minutes it is possible to spin up a cluster and deploy the...
        </description>
        <pubDate>Sat, 21 Mar 2020 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2020-03-21-fooling-the-blue-team-abusing-insecure-elk/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2020-03-21-fooling-the-blue-team-abusing-insecure-elk/</guid>
      </item>
    
      <item>
        <title>Extending BloodHound</title>
        <description>
          Part 1 - GPOs and User Right Assignment - 
          This series of posts was inspired by porterhau5’s work that can be found here: Extending BloodHound: Track and Visualize Your Compromise. 1. The Problem In a standard Active Directory assessment, a fundamental phase is the analysis of Group Policy Objects (GPOs). Usually, this activity is aimed at identifying the following:...
        </description>
        <pubDate>Thu, 06 Feb 2020 00:00:00 -0800</pubDate>
        <link>https://riccardoancarani.github.io/2020-02-06-extending-bloodhound-pt1/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2020-02-06-extending-bloodhound-pt1/</guid>
      </item>
    
      <item>
        <title>Hunting for SCShell Usage Using ELK</title>
        <description>
          hunt hunt hunt - 
          Introduction In today’s post we’re going to create detections and hunt for the usage of the recent lateral movement technique called SCShell. In a nutshell, the SCShell technique is born from the limitation of lateral movement attacks like remote service creation that required the attacker to drop files on the...
        </description>
        <pubDate>Mon, 16 Dec 2019 00:00:00 -0800</pubDate>
        <link>https://riccardoancarani.github.io/2019-12-16-hunting-for-scshell-usage/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2019-12-16-hunting-for-scshell-usage/</guid>
      </item>
    
      <item>
        <title>Streamlining BloodHound Analytics</title>
        <description>
          Jupyter all the things - 
          Introduction As a penetration tester, I often rely on BloodHound to assist me in Active Directory engagements. However, after a few of them it was clear that I was repeating the same actions (hence the same queries) over and over again. I felt that doing this initial process manually was...
        </description>
        <pubDate>Sun, 08 Dec 2019 00:00:00 -0800</pubDate>
        <link>https://riccardoancarani.github.io/2019-12-08-streamlining-bloodhound-analytics/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2019-12-08-streamlining-bloodhound-analytics/</guid>
      </item>
    
      <item>
        <title>Not All Paths are Created Equal</title>
        <description>
          Attackers' Economy (Part 1) - 
          Introduction BloodHound was a revolution for evaluating Active Directory (AD) security and identifying unintended paths that could lead to the compromise of sensitive groups such as Domain Admins. The community has been using it successfully in many engagements and against highly secure environments. For those who’ve been living in a...
        </description>
        <pubDate>Fri, 08 Nov 2019 00:00:00 -0800</pubDate>
        <link>https://riccardoancarani.github.io/2019-11-08-not-all-paths-are-equal/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2019-11-08-not-all-paths-are-equal/</guid>
      </item>
    
      <item>
        <title>Hunting for Suspicious LDAP Activity with SilkETW and Yara</title>
        <description>
          Detecting Active Directory Enumeration - 
          Intro This is another post to document my journey of learning Threat Hunting. In today’s post we’re going to perform threat hunting activities with the aim of hunting for AD domain enumeration. We’re going to heavily rely on FireEye’s SilkETW and we’ll search for suspicious LDAP queries generated by our...
        </description>
        <pubDate>Sat, 19 Oct 2019 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2019-10-19-hunting-for-domain-enumeration/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2019-10-19-hunting-for-domain-enumeration/</guid>
      </item>
    
      <item>
        <title>Hunting for Anomalous Usage of MSBuild and Covenant</title>
        <description>
          
          Today’s post will cover some of my experiments while practicing threat hunting. Specifically today we will cover hunting for malicious usage of msbuild.exe used by Covenant. I literally started last week, so forgive me if I’m not following logging best practices or some detections are very unreliable! It must be...
        </description>
        <pubDate>Sat, 19 Oct 2019 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2019-10-19-hunting-covenant-msbuild/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2019-10-19-hunting-covenant-msbuild/</guid>
      </item>
    
      <item>
        <title>Lateral Movement</title>
        <description>
          Windows and Active Directory - 
          Introduction Find Where We Have Access Local Group Membership - The Blind Approach Local Group Membership - Group Policy Objects Access to File Shares Access Control Lists MSSQL Access WMI Remote Service Creation Remote Desktop Protocol PowerShell Remoting Task Scheduler PsExec DCOM Password Spray Folder Redirection and Roaming Profiles RDP...
        </description>
        <pubDate>Fri, 04 Oct 2019 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2019-10-04-lateral-movement-megaprimer/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2019-10-04-lateral-movement-megaprimer/</guid>
      </item>
    
      <item>
        <title>Modern C2 Infrastructure with Terraform, DigitalOcean, Covenant and Cloudflare</title>
        <description>
          Part 1 - 
          This is going to be a quick walkthrough of how I would set up a Command and Control (C2) infrastructure using the following technologies: Terraform (https://www.terraform.io/) DigitalOcean (https://cloud.digitalocean.com) Cloudflare (https://www.cloudflare.com) Covenant (https://github.com/cobbr/Covenant) The aim of this post is mainly practicing building reliable and reusable C2 infrastructures for red team engagements....
        </description>
        <pubDate>Sat, 28 Sep 2019 00:00:00 -0700</pubDate>
        <link>https://riccardoancarani.github.io/2019-09-28-modern-c2-infra/</link>
        <guid isPermaLink="true">https://riccardoancarani.github.io/2019-09-28-modern-c2-infra/</guid>
      </item>
    
  </channel>
</rss>
