• Home
Subscribe

 bestestredteam

bestestredteam

All posts in Cybersecurity

Navigating To A Web Site Step By Step

Navigating To A Web Site Step By Step

Ryan Villarreal / August 01, 2019

What exactly happens when you type google.com into your browser. Let's take a walk through the steps taken.…

Read More

Tags: CertificatesCybersecurityHTTP/2PHPWeb ApplicationWebAppCORSXSSHTTP
PlexTrac for Faster Report Writing!

PlexTrac for Faster Report Writing!

Ryan Villarreal / July 15, 2019

PlexTrac is the next generation platform for cybersecurity professionals. Workflow integrations and automated reporting make PlexTrac the last cybersecurity tool you will ever need.…

Read More

Tags: CloudCybersecurityJuiceShopOWASPPentestpenetration testReportingVulnerability Scanning
Bypassing Anti-CSRF with Burp Suite Session Handling

Bypassing Anti-CSRF with Burp Suite Session Handling

Ryan Villarreal / May 25, 2019

Using Burp Suite to bypass anti-CSRF protections with the built-in Session Handling and Macro recorder.…

Read More

Tags: burpsuiteweb appWeb TokenBypassCybersecurityDVWAKali ToolsOWASPPentestCSRFAnti-CSRF
Hot on the Trail of Domain Admin: Bloodhound Intro

Hot on the Trail of Domain Admin: Bloodhound Intro

Ryan Villarreal / November 20, 2018

BloodHound is a tool to analyze and understand Active Directory Trust Relationships. Utilize Bloodhound to find shortest path to Domain Admin.…

Read More

Tags: BloodhoundPentestInternal NetworkActive DirectoryDomain Adminpenetration testKali LinuxGraph TheoryNeo4jCybersecurity
Page 1 of 1

About bestestredteam

Two cybersecurity professionals trying to get better at all things security.

Help support server costs!

Banner Ad

Latest Posts

  • BooFuzz: Spooky HTTP Fuzzing
    October 28, 2020
  • What the Fuzz? American Fuzzy Lop
    August 25, 2020
  • ROP Emporium - 0x03 (Callme)
    May 22, 2020

Authors

  • Ryan Villarreal
  • Ryan Smith
  • Bestest RedTeam

Tags

802.11802.11ax802.1xActive DirectoryAFLAnti-CSRFAssemblyAutomateAutomationAWSBetaBettercapBGPBinaryBinary NinjaBinaryNinjaBitcoinBloodhoundBlue TeamBooFuzzBunnyburpsuitebWAPPBypassbyt3bl33d3rC ProgrammingC2CACapture The FlagCertificatesCloudClusterCMECobalt StrikeCodingCommand and ControlCommand LineContainerCORSCrackMapExecCSRFCTFCybersecurityDebugDebuggerDeep DiveDetectionDevice DriversDockerDomain AdminDomain ControllerDVWAeLearnSecurityELFelkelkstackEnumerationeWPTExecutionPolicyExploitDevFreeRADIUSFuzzingGDBghostGNUGNU RadioGoogle CloudGoPhishGraph TheoryHackingHackRFHashcatHijackingHTTPHTTP/2ImpacketInformation GatheringInternal NetworkInternet of ThingsJavaScriptJuiceShopJWTKali LinuxKali ToolsKerberosKernelLateral MovementLinuxMerlinMicrosoftMicrosoft OfficeMiningNe0nd0gNeo4jNetworkingNULL SessionOffensive SecurityOffSecopen redirectOSCEOSWPOWASPpassword crackingpenetration testPentestPhishingPHPPineapplePixel TrackingPortainerPost ExploitationPowershellProtocolsPwntoolsPythonRadio FrequencyReconRed TeamingRed-BaronRedteamingReportingReviewRFRFCROPRopemporiumRTL-SDRS3SambaScansScapyScriptingService Principal NameServicesShodanSMBSMBClientSocial EngineeringSoftware Defined RadioSPNSulleySwarmsysadminTerraformTerraformFunTrainingUser modeUUIDVulnerability Scanningwardrivingweb appWeb ApplicationWeb TokenWebAppWifiWiFuWiglewindowswirelessWPAXSS
Twitter GitHub
Opinions expressed are solely our own and do not express the views or opinions of our employers.