Skip to content
HiveSecurity
  • Home
  • Blog
  • Tags
  • Vulnerabilities
    • Tools
    • Cheat Sheet
    • Security Guides
  • Contact
  • About
Esc
Type to search...
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Resources
  • Tools
  • Cheat Sheet
  • Security Guides
  • Contact
  • About
← All tags Tag

Red Team

62 articles

AD Attack Chains: From Initial Access to Domain Admin

A complete purple team walkthrough of Active Directory attack chains — from initial foothold through Kerberoasting, DCSync, and Golden Tickets to full domain compromise, with detection rules for every technique.

7 May 2026
Active Directory Blue Team Cybersecurity

ADCS Abuse with Certipy: From Low-Priv User to Domain Admin via Certificate Services

Active Directory Certificate Services is installed in most enterprise networks — and almost always misconfigured. Here's how attackers exploit ESC1 through ESC8 with Certipy, and how to detect and stop them.

7 May 2026
Active Directory Red Team Blue Team

AI Agent Traps: Six Ways Attackers Manipulate Autonomous AI — With Real Examples

Google DeepMind published the first systematic taxonomy of AI agent manipulation techniques. Here's what each attack looks like in practice — and why most AI deployments are already vulnerable.

7 May 2026
AI Security Cybersecurity Red Team

AirSnitch: How Attackers Silently Break Wi-Fi Client Isolation

AirSnitch bypasses Wi-Fi client isolation using four attack primitives — even on WPA3. Every router tested was vulnerable. Here's how it works and how to defend against it.

7 May 2026
Cybersecurity Network Security Red Team

AitM Phishing: How Attackers Bypass MFA and How to Stop Them

Adversary-in-the-Middle phishing silently proxies real login pages and steals session tokens — making MFA useless. Here's how it works and how to detect it.

7 May 2026
Phishing Red Team Blue Team

API Security in 2026: JWT Attacks, OAuth Abuse, and GraphQL Exploitation

APIs are the most exploited attack surface in 2026. Learn how attackers abuse JWT tokens, OAuth flows, and GraphQL endpoints — and how to stop them.

7 May 2026
Web Security Red Team Blue Team

Attack to Defend: Why the Best Security Professionals Think on Both Sides

The most dangerous defenders understand how attackers think. The best red teamers understand what defenders see. Here's why the divide between offense and defense is killing your security program.

7 May 2026
Red Team Blue Team Cybersecurity

AutoHotkey Malware Loaders: How Attackers Weaponize Automation Scripts

AutoHotkey isn't just for productivity scripts — attackers use it as a stealthy malware loader. Learn how AHK-based campaigns work and how to detect them.

7 May 2026
Malware Analysis Detection Red Team

AWS IAM Privilege Escalation to Data Exfil: The Full Attack Chain

How attackers escalate from a low-privilege AWS IAM credential to full S3 data theft — and the CloudTrail events, GuardDuty findings, and Sigma rules that expose them.

7 May 2026
Cloud Security Red Team Blue Team

BloodHound from First Run to Domain Admin: A Practical Red Team Guide

A hands-on red team guide to BloodHound CE — from SharpHound data collection to reading attack paths and finding the fastest route to Domain Admin in Active Directory.

7 May 2026
Active Directory Red Team Penetration Testing

Browser-in-the-Browser: The Phishing Attack That Fakes the Browser Itself

Browser-in-the-Browser (BitB) attacks forge convincing browser popup windows using pure HTML and CSS — making phishing pages nearly impossible to spot by eye. Here's how it works and how to defend against it.

7 May 2026
Phishing Web Security Red Team

BYOVD: How Attackers Use Legitimate Drivers to Kill Your Security Tools

BYOVD (Bring Your Own Vulnerable Driver) lets attackers reach the Windows kernel using signed, legitimate drivers — and then silently kill your EDR before ransomware drops.

7 May 2026
Red Team Blue Team Malware Analysis

The Build Is the Target: CI/CD Pipeline Attacks and How to Detect Them

Your CI/CD pipeline stores production credentials, runs code automatically, and trusts pull requests. Here's how attackers exploit that — and the detection logic to catch them.

7 May 2026
Red Team Blue Team Supply Chain

The 'Fix' Is the Exploit: ClickFix, FileFix, JackFix and Pastejacking Attacks Explained

ClickFix attacks trick users into running malicious code disguised as legitimate troubleshooting. Learn how these social engineering tactics work and how to defend against them.

7 May 2026
Cybersecurity Social Engineering Threat Intelligence

Cobalt Strike Detection & Hunting: A Defender's Playbook

How to detect Cobalt Strike beacons in your environment — network fingerprints, process injection patterns, Sigma rules, and practical hunting queries for blue teams.

7 May 2026
Blue Team Cobalt Strike Threat Hunting

CrackArmor: Nine AppArmor Flaws That Let Attackers Own the Kernel

Qualys TRU disclosed nine confused deputy vulnerabilities in Linux AppArmor — exposing 12.6 million servers to root escalation, KASLR bypass, and container isolation collapse. Technical deep dive and detection guide.

7 May 2026
Linux Kernel Security Red Team

CSRF Explained: How Attackers Trick Your Browser Into Making Requests for Them

CSRF (Cross-Site Request Forgery) forces authenticated users to unknowingly submit requests to a site they're logged into. Learn how it works, how to find it, and how to fix it.

7 May 2026
Web Security Red Team OWASP

DCSync: How Attackers Steal Every Password in Your Domain — and How to Stop Them

DCSync abuses Active Directory replication to pull every password hash from a domain controller without touching it. Here's how the attack works, what it leaves in your logs, and how to build detections that catch it.

7 May 2026
Active Directory Red Team Blue Team

The Digital Parasite: How Attacker Tradecraft Evolved in 2026

80% of top MITRE ATT&CK techniques now focus on evasion and persistence. Attackers abandoned smash-and-grab for long-term parasitic operations in networks.

7 May 2026
Cybersecurity Lateral Movement MITRE ATT&CK

Entra ID Attacks in Practice: Device Code Phishing, PRT Theft, and Conditional Access Bypass

MFA is no longer enough to protect Microsoft Entra ID accounts. Attackers steal tokens, register their own devices, and bypass Conditional Access — without ever touching a password. Here's the full attack chain and how to detect it.

7 May 2026
Cloud Security Red Team Blue Team

Hacking Prison Sentences: Real Convictions That Should Terrify You

From 10 years to life in prison - real cybercrime convictions from Europe, USA, and Asia. DDoS, ransomware, and data theft aren't victimless crimes.

7 May 2026
Cybersecurity Threat Intelligence Privacy

IDOR Explained: How Attackers Access Anyone's Data by Changing a Number

IDOR (Insecure Direct Object Reference) is one of the most common and most impactful web vulnerabilities. Learn how it works, how to find it, and how to fix it.

7 May 2026
Web Security Red Team OWASP

Invisible Characters as an Attack Vector

Unicode's invisible characters are being weaponized — hiding malicious code in repositories, hijacking AI agents, and bypassing security reviews without leaving a trace visible to human eyes.

7 May 2026
Cybersecurity Web Security Red Team

The EDR Dead Zone: How Attackers Pivot Through Cameras and NAS Devices

IoT devices like IP cameras and NAS boxes sit on your network but outside your EDR coverage. Here's how attackers exploit them to pivot — and how defenders can detect it.

7 May 2026
Cybersecurity Red Team Blue Team

Linux Lateral Movement: Attack Techniques and How to Detect Them

A complete guide to Linux lateral movement — SSH pivoting, ssh-agent hijacking, credential harvesting, port forwarding, and NFS abuse. Includes auditd rules, Sigma, Wazuh, and Sentinel KQL detections.

7 May 2026
Linux Red Team Blue Team

Linux Privilege Escalation: Attack Techniques and How to Detect Them

A complete guide to Linux privilege escalation — SUID abuse, sudo misconfig, cron hijacking, capabilities, and kernel exploits. Includes auditd rules, Sigma, Wazuh, and Sentinel KQL detections.

7 May 2026
Linux Red Team Blue Team

Trust Me, I'm a Shortcut: How LNK Files Lie to Windows Explorer

Windows .lnk shortcut files can show one target while silently executing another. Discover five spoofing techniques including CVE-2025-9491, how attackers exploit them, and how to detect them.

7 May 2026
Red Team Blue Team Windows Security

LOLBins in 2026: How Attackers Use Windows Against Itself

79% of attacks in 2024 used no malware at all. Attackers abuse Windows' own built-in tools — certutil, mshta, rundll32 — to execute code and evade detection. Here's the full attack playbook and how to detect it.

7 May 2026
Red Team Blue Team Detection

macOS Offensive Security: How Attackers Exploit Apple's Unique Attack Surface

TCC bypass, Keychain theft, Launch Agent persistence, dylib hijacking — how attackers target macOS and how defenders detect them. Attack→Detect with real commands.

7 May 2026
Red Team Blue Team Detection

MCP Servers Through an Attacker's Eyes: What Happens When You Plug In Without Thinking

MCP servers let AI assistants control your tools — but most users install them without understanding the attack surface. Here's what attackers already know.

7 May 2026
AI Security Cybersecurity Supply Chain

Mobile Pentesting: How to Attack Android and iOS Apps Like a Professional

A practical guide to mobile application penetration testing on Android and iOS — static analysis, dynamic analysis, traffic interception, and the most common vulnerabilities found in real engagements.

7 May 2026
Mobile Security Red Team Penetration Testing

Network Penetration Testing: From Nmap Scan to Pivoting Deep Into the Network

A practical guide to network penetration testing — host discovery, service enumeration, vulnerability exploitation, credential attacks, and pivoting through segmented networks.

7 May 2026
Network Security Red Team Penetration Testing

NTFS Alternate Data Streams: How Attackers Hide in Plain Sight

NTFS Alternate Data Streams let attackers hide executables inside innocent-looking files. Learn how ADS works, how malware uses it, and how to detect it with PowerShell, Sysinternals, and Sysmon.

7 May 2026
Red Team Blue Team Windows Security

NTLM Relay in 2026: Microsoft Declared It Dead. Attackers Didn't Get the Memo.

Microsoft is officially deprecating NTLM — yet CVE-2025-24054 was actively exploited days after patching, and the Coercion → Relay → ADCS → Domain Admin chain still works in most enterprise environments. Here's the full 2026 kill chain and how to detect it.

7 May 2026
Active Directory Red Team Blue Team

Pass-the-Hash & Pass-the-Ticket: How Attackers Move Laterally — and How to Catch Them

A practitioner's guide to PtH and PtT attacks: how they work, what tools attackers use, what evidence they leave behind, and how to build detections with Sigma and Wazuh.

7 May 2026
Active Directory Red Team Blue Team

Prompt Injection in 2026: From Research Toy to Real CVEs, Agent Hijacking, and Zero-Click Exfiltration

CVE-2025-32711 (EchoLeak) exfiltrated M365 data with zero user interaction. The Anthropic MCP server had three exploitable injection CVEs. OpenAI says AI browsers may never be fully fixed. Here's the full attack chain — and how to detect it.

7 May 2026
AI Security Red Team Blue Team

Purple Teaming on a Budget: Free Tools and Frameworks That Actually Work

A practical guide to building a purple team program using only free, open-source tools. Covers Atomic Red Team, MITRE Caldera, Sigma rules, Wazuh, and VECTR with real setup examples.

7 May 2026
Blue Team Cybersecurity MITRE ATT&CK

72 Hours to Domain Admin: A Red Team Engagement Debrief

A step-by-step debrief of a real-world red team engagement — from passive OSINT through AiTM phishing, EDR evasion, and ADCS exploitation to full domain compromise. What worked, what didn't, and what would have stopped us.

7 May 2026
Red Team Active Directory Penetration Testing

Shadow Credentials: Account Takeover Without a Password

Shadow Credentials abuse msDS-KeyCredentialLink via DACL misconfiguration to add a rogue certificate, authenticate via PKINIT, and extract NT hashes — no password required.

7 May 2026
Active Directory Red Team Blue Team

SQL Injection in 2026: The Complete Attack and Defense Guide

SQL injection has existed since 1998 and still powers major breaches in 2026. A complete guide covering every attack type, real exploitation techniques, detection logic, and how to actually fix it.

7 May 2026
Web Security Red Team Blue Team

SSRF Explained: How Attackers Make Servers Fetch Secrets for Them

Server-Side Request Forgery (SSRF) lets attackers trick a server into making requests on their behalf — reaching internal systems, cloud credentials, and more.

7 May 2026
Web Security Red Team Blue Team

Starkiller: Inside Empire's C2 GUI — Red Team Playbook and Blue Team Detection

A technical deep dive into Starkiller and PowerShell Empire — how red teams deploy and operate it, and exactly how defenders can detect and disrupt it.

7 May 2026
Blue Team Cybersecurity Lateral Movement

State-Sponsored Threat Actors 2026: Who They Are and What They Do

A threat intelligence deep-dive into the world's most dangerous state-sponsored APT groups — their identities, motivations, campaigns, and tradecraft in 2026.

7 May 2026
Threat Intelligence APT Nation-State

Web Application Penetration Testing 2026: Beyond OWASP Top 10

Advanced web application security testing techniques covering modern frameworks, API exploitation, authentication bypass, and real-world attack scenarios for 2026

7 May 2026
Red Team Web Security Cybersecurity

When Trusted Agents Turn Rogue: The Rise of the Double Agent in Modern AI Systems

AI agents are trusted to act on your behalf — but that trust is exactly what attackers exploit. Here's how AI agents get turned against you, and why you won't see it coming.

7 May 2026
AI Security Cybersecurity Red Team

Why Enterprise VPN and Gateway Products Are Perpetually Broken

Ivanti, Fortinet, Palo Alto — the names change but the pattern doesn't. Here's the structural reason why enterprise edge devices are permanently on fire and what you can do about it.

7 May 2026
Cybersecurity Red Team Blue Team

Xanthorox AI: When the Attacker's AI Goes Dark

Xanthorox is an offline, modular AI attack platform with five specialized models — and it needs no cloud, no API, and leaves no traditional IoCs. Here's what defenders need to know.

7 May 2026
Cybersecurity Malware Analysis AI Security

XSS Explained: How Attackers Inject Code Into Your Browser

Cross-Site Scripting (XSS) lets attackers inject malicious JavaScript into web pages viewed by other users — stealing sessions, redirecting victims, and taking over accounts.

7 May 2026
Web Security Red Team Blue Team

Zombie ZIP: How a Malformed Archive Header Blinds 98% of Antivirus Engines

CVE-2026-0866 — a single two-byte header manipulation causes 50 of 51 AV engines to scan compressed noise instead of the actual payload. Technical breakdown, attack scenarios, and detection.

7 May 2026
Malware Analysis Red Team Detection

Memory Forensics with Volatility 3: What Attackers Leave Behind

How attackers hide in RAM using fileless malware and process injection — and how defenders use Volatility 3 to find them. Practical DFIR workflow with real commands.

30 April 2026
Malware Analysis Blue Team Detection

MITRE ATT&CK v19: Defense Evasion Is Dead — Meet Stealth and Impair Defenses

ATT&CK v19 drops April 28 and splits Defense Evasion into two tactics. Here's what changes, why it matters for detection engineering, and what you need to do before the weekend.

26 April 2026
MITRE ATT&CK Detection Blue Team

Active Directory Attacks: The Complete Attack Path Guide

A structured guide to Active Directory attack techniques — from BloodHound enumeration through Kerberoasting, LSASS dumping, ADCS abuse, and Shadow Credentials to Entra ID pivot. Every technique with detection coverage.

8 April 2026
Active Directory Red Team Blue Team

Kubernetes and Container Security: Attacks, Misconfigurations, and Defenses

How attackers break out of containers, escalate privileges in Kubernetes clusters, and move into cloud infrastructure — and how defenders detect and stop them.

8 April 2026
Cybersecurity Red Team Blue Team

Modern Windows Attack Techniques in 2026: Evasion, Delivery, and Stealth

A structured guide to modern Windows attack techniques — BYOVD EDR evasion, LOLBins, invisible character injection, ClickFix delivery, NTFS steganography, and C2 over trusted cloud services. How they work, how to detect them.

8 April 2026
Red Team Blue Team Malware Analysis

OSINT and Recon Methodology: A Practical Guide for Security Professionals

How to systematically map an organization's attack surface using open-source intelligence — domains, infrastructure, employees, leaked credentials, and exposed secrets.

8 April 2026
Red Team Penetration Testing Threat Intelligence

Passkeys and FIDO2: The End of Passwords — and What Attackers Do Next

How passkeys and FIDO2 work, why they defeat phishing and credential stuffing, and how attackers are already adapting with downgrade attacks and fallback abuse.

8 April 2026
Cybersecurity Authentication Hardening

Cookie-Controlled PHP Webshells: A Stealthy Tradecraft in Linux Hosting Environments

Microsoft's Defender team uncovered a clever attacker technique: PHP webshells that stay completely dormant until activated by a secret HTTP cookie. Here's how it works — and how to catch it.

4 April 2026
Web Security Red Team Blue Team

Salt Typhoon: How China Hacked the World's Largest Telecoms

Salt Typhoon is the worst telecom breach in history. The Chinese APT stayed hidden for years inside AT&T, Verizon and T-Mobile. Here's the full attack chain, the tools they used, and the detection opportunities blue teams missed.

17 March 2026
Threat Intelligence Red Team Blue Team

Kerberoasting: A Deep Dive into Service Account Attacks

A comprehensive analysis of Kerberoasting — how it works at the protocol level, detection opportunities, and hardening strategies for Active Directory environments.

1 March 2026
Active Directory Kerberos Red Team

LSASS Dumping: Techniques, Evasion, and Detection

LSASS credential dumping is one of the most reliable post-exploitation techniques. Survey of methods from MiniDump to direct syscalls and custom loaders, with detection logic and Sysmon rules for each approach.

15 February 2026
Credential Dumping Red Team EDR Evasion

Client-Side File Analysis with Directory Tool Pro

A Chrome extension for local file scanning and secrets detection. No cloud uploads, instant analysis, useful for security audits and pentesting workflows.

19 January 2026
Cybersecurity Red Team Web Security

PSO - When Printers Become the Pentester's Blindspot

How we built PSO — an open-source pentesting tool exposing the forgotten attack surface in corporate networks: network printers. Covers PJL exploitation, IPP vulnerabilities, and automated printer discovery.

3 January 2026
Cybersecurity Red Team
HiveSecurity

Offensive thinking. Defensive expertise.

Content
  • Home
  • Blog
  • Tags
  • Vulnerabilities
Resources
  • Tools
  • Cheat Sheet
  • Security Guides
Company
  • Contact
  • About
  • RSS
  • Privacy

© 2026 Hive Security. All rights reserved.

Built with zero trust & least privilege