Red Team Finds a Way

Iulian F

Emulating real world attackers or groups (Example: APT28) targeting the client's infrastructure in order to identify flaws and test their defensive security team response.
Using specific tactics, techniques and procedures (TTPs) it was possible to compromise multiple vessels (oil tankers and not only) and reaching directly within the ICS network which was fully segregated.
A blog post related to red teaming activities I created is located at https://securitycafe.ro/2024/07/02/red-team-finds-a-way-exploiting-the-human-factor/
Like this project

Posted Jul 13, 2024

Emulating real world attackers by targeting the client's infrastructure in order to identify flaws and test their defensive security team response.

Bypassing Application Whitelisting
Bypassing Application Whitelisting
CVE-2023-4843
CVE-2023-4843
PSRoleJuggle
PSRoleJuggle
Active Directory Delegation Based Attacks
Active Directory Delegation Based Attacks

Join 50k+ companies and 1M+ independents

Contra Logo

© 2025 Contra.Work Inc