Skip to content
HiveSecurity
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Tools
  • Contact
  • About
Esc
Type to search...
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Tools
  • Contact
  • About
← All tags Tag

Red Team

16 articles

ADCS Abuse with Certipy: From Low-Priv User to Domain Admin via Certificate Services

Active Directory Certificate Services is installed in most enterprise networks — and almost always misconfigured. Here's how attackers exploit ESC1 through ESC8 with Certipy, and how to detect and stop them.

21 March 2026
Active Directory Red Team Blue Team

LOLBins in 2026: How Attackers Use Windows Against Itself

79% of attacks in 2024 used no malware at all. Attackers abuse Windows' own built-in tools — certutil, mshta, rundll32 — to execute code and evade detection. Here's the full attack playbook and how to detect it.

21 March 2026
Red Team Blue Team Detection

Entra ID Attacks in Practice: Device Code Phishing, PRT Theft, and Conditional Access Bypass

MFA is no longer enough to protect Microsoft Entra ID accounts. Attackers steal tokens, register their own devices, and bypass Conditional Access — without ever touching a password. Here's the full attack chain and how to detect it.

17 March 2026
Cloud Security Red Team Blue Team

Salt Typhoon: How China Hacked the World's Largest Telecoms — And How It Could Have Been Detected

Salt Typhoon is the worst telecom breach in history. The Chinese APT stayed hidden for years inside AT&T, Verizon and T-Mobile. Here's the full attack chain, the tools they used, and the detection opportunities blue teams missed.

17 March 2026
Threat Intelligence Red Team Blue Team

Invisible Characters as an Attack Vector

Unicode's invisible characters are being weaponized — hiding malicious code in repositories, hijacking AI agents, and bypassing security reviews without leaving a trace visible to human eyes.

15 March 2026
Cybersecurity Web Security Red Team

CrackArmor: Nine AppArmor Flaws That Let Attackers Own the Kernel

Qualys TRU disclosed nine confused deputy vulnerabilities in Linux AppArmor — exposing 12.6 million servers to root escalation, KASLR bypass, and container isolation collapse. Technical deep dive and detection guide.

13 March 2026
Linux Kernel Security Red Team

Zombie ZIP: How a Malformed Archive Header Blinds 98% of Antivirus Engines

CVE-2026-0866 — a single two-byte header manipulation causes 50 of 51 AV engines to scan compressed noise instead of the actual payload. Technical breakdown, attack scenarios, and detection.

13 March 2026
Malware Analysis Red Team Detection

Kerberoasting: A Deep Dive into Service Account Attacks

A comprehensive analysis of Kerberoasting — how it works at the protocol level, detection opportunities, and hardening strategies for Active Directory environments.

1 March 2026
Active Directory Kerberos Red Team

Starkiller: Inside Empire's C2 GUI — Red Team Playbook and Blue Team Detection

A technical deep dive into Starkiller and PowerShell Empire — how red teams deploy and operate it, and exactly how defenders can detect and disrupt it.

21 February 2026
Blue Team Cybersecurity Lateral Movement

AD Attack Chains: From Initial Access to Domain Admin — And How to Detect Every Step

A complete purple team walkthrough of Active Directory attack chains — from initial foothold through Kerberoasting, DCSync, and Golden Tickets to full domain compromise, with detection rules for every technique.

16 February 2026
Active Directory Blue Team Cybersecurity

LSASS Dumping: Techniques, Evasion, and Detection

A survey of LSASS credential dumping methods from MiniDump to direct syscalls, with detection logic for each technique.

15 February 2026
Credential Dumping Red Team EDR Evasion

Purple Teaming on a Budget: Free Tools and Frameworks That Actually Work

A practical guide to building a purple team program using only free, open-source tools. Covers Atomic Red Team, MITRE Caldera, Sigma rules, Wazuh, and VECTR with real setup examples.

14 February 2026
Blue Team Cybersecurity MITRE ATT&CK

The Digital Parasite: How Attacker Tradecraft Evolved in 2026

80% of top MITRE ATT&CK techniques now focus on evasion and persistence. Attackers abandoned smash-and-grab for long-term parasitic operations in networks.

10 February 2026
Cybersecurity Lateral Movement MITRE ATT&CK

Client-Side File Analysis with Directory Tool Pro

A Chrome extension for local file scanning and secrets detection. No cloud uploads, instant analysis, useful for security audits and pentesting workflows.

19 January 2026
Cybersecurity Red Team Web Security

PSO - When Printers Become the Pentester's Blindspot

How we built an open-source pentesting tool that exposes the forgotten attack surface in corporate networks - printers.

3 January 2026
Cybersecurity Red Team

Web Application Penetration Testing 2026: Beyond OWASP Top 10

Advanced web application security testing techniques covering modern frameworks, API exploitation, authentication bypass, and real-world attack scenarios for 2026

20 December 2025
Red Team Web Security
HiveSecurity

Offensive thinking. Defensive expertise.

  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Tools
  • Contact
  • About
  • RSS

© 2026 Hive Security. All rights reserved.

Built with zero trust & least privilege