10 Hot Red Team Tools Set to Hit Black Hat Europe
The slate of Arsenal presentations at Black Hat Europe is set to feature lots of low-cost and free goodies for offensive security pros.
October 16, 2021
![Red Toolbox Red Toolbox](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt692e11bade4cef8b/64f15223bf91345c5d85328d/bheuarsenaltools.jpeg?width=700&auto=webp&quality=80&disable=upscale)
Source: Sataporn via Adobe Stock
The latest round of Black Hat Arsenal, next month at Black Hat Europe, is set to put the spotlight on a range of new and evolving tools tailor-made for penetration testers, red teamers, and other offensive security professionals. Some tools are brand new, while others are evolving and unveiling new features at the show. Either way, Arsenal will offer up plenty of tools for discovering misconfigurations, building out exploits, delivering payloads, tracking penetration testing campaigns, and more.
Presenter: Nestori Syynimaa
Billed as a Swiss Army knife for Azure Active Directory and Microsoft 365, AADInternals is a PowerShell module designed for administering and auditing AD and M365 environments. The tool can create backdoors, perform privilege escalations, run denial-of-service attacks, extract information, and bypass multifactor authentication. The Arsenal presentation will run down two years' worth of research that has gone into refining AADInternals and will unveil a new technique for extracting AD Federation Services signing certificates remotely.
For more info: https://github.com/Gerenios/AADInternals
Presenter: Vasant Kumar Chinnipilli
An open source, platform-agnostic security auditing tool for Kubernetes clusters, Kubestriker gives pen testers and red teamers another arrow in their collective quiver for seeking out weaknesses within IT infrastructure. The tool does in-depth checks on services and open ports on a range of platforms — including self-hosted Kubernetes, Amazon EKS, Azure AKS, and Google GKE — to pick up on misconfigurations that could be easily leveraged for an attack.
For more info: https://github.com/vchinnipilli/kubestriker
Presenter: Luca Bongiorni
USBsamurai can help offensive security professionals demonstrate that even air-gapped systems are within reach of resourceful attackers. It’s a remotely controlled USB HID injecting cable that can be used to compromise targets remotely using a proprietary 2.4-GHz protocol. The creator’s Arsenal talk will run through how to build the tool using $15 worth of off-the-shelf components. He’ll also discuss countermeasures to these types of implant tools.
Presenter: Andrew Blyth
A hardware serial communication bus used by many processors, Universal Asynchronous Receiver Transmitter (UART) creates a communication channel for users and developers to interact with the processor through serial ports. This Arsenal presentation will unveil a new tool for brute-forcing UART connections on embedded devices, providing pen testers and researchers a way to manipulate embedded systems.
Presenter: Mohammad Askar
DNS has increasingly becoming a popular channel for attackers to move data around. DNSStager follows this trend by helping offensive security professionals quietly hide and transfer payloads using DNS. It’s an open source project based on Python that can split payloads into chunks and hide and resolve payloads in IPV6 or TXT records.
For more info: https://github.com/mhaskar/DNSStager
Presenter: Monstar Studi
Many of the worst data exposures have come by way of credentials and secrets that are stored insecurely in cloud-based development environments. Git Wild Hunt is an evolving tool designed for pen testers and security pros to scour their Github repositories for dozens of credentials that could put their infrastructure at risk. This includes over 30 flavors of different authentication tokens, API keys, and stored secrets.
For more info: https://github.com/d1vious/git-wild-hunt
Presenter: Lucas Philippe
A cross-site scripting (XSS) exploitation framework, Xsstools provides the means for offensive security professionals to build powerful and reusable payloads that can be compiled to work in numerous situations. This includes facilitating attacks like form submission with CSRF tokens, data exfiltration, clickjacking, and keylogging. At Arsenal, the tool’s creator will release new features that include cache-only spidering and persistent exploitation.
For more info: https://github.com/yeswehack/xsstools
Presenters: Ilya Shaposhnikov, Sergey Bliznyuk, Maksim Lebedev, and Sofia Marakhovich
An open source toolkit that’s building momentum, the Pentest Collaboration Framework helps pen testers and red teams share information and collaborate on the penetration testing process, providing the means to automate routine processes and more easily document findings. This latest Arsenal talk will present a new templates library feature.
For more info: https://gitlab.com/invuls/pentest-projects/pcf
Presenter: Mike Houziaux
Black Hat Europe will highlight not one but two pen test collaboration tools. The second one is SMERSH, an open source tool built to manage pen test campaigns. The tool centralizes data and offers either a GUI- or Python-based client to track progress and exchange information with everyone working on digging up and reporting bugs during a campaign.
For more info: https://github.com/CMEPW/Smersh
Presenters: Daniel Oates-Lee and Chris Morris
SMBeagle is a new SMB share hunter that is set to be released at Black Hat Europe. The tool identifies connected networks on end user devices and scans them for open SMB shares, sniffing out insecure networks shares susceptible to ransomware and other attacks. Pen testers can also use the tool to identify business-sensitive data and credentials in configuration files and scripts. SMBeagle offers red teams a way to seek out vectors for privilege escalation and exposed sensitive business data.
Presenters: Daniel Oates-Lee and Chris Morris
SMBeagle is a new SMB share hunter that is set to be released at Black Hat Europe. The tool identifies connected networks on end user devices and scans them for open SMB shares, sniffing out insecure networks shares susceptible to ransomware and other attacks. Pen testers can also use the tool to identify business-sensitive data and credentials in configuration files and scripts. SMBeagle offers red teams a way to seek out vectors for privilege escalation and exposed sensitive business data.
The latest round of Black Hat Arsenal, next month at Black Hat Europe, is set to put the spotlight on a range of new and evolving tools tailor-made for penetration testers, red teamers, and other offensive security professionals. Some tools are brand new, while others are evolving and unveiling new features at the show. Either way, Arsenal will offer up plenty of tools for discovering misconfigurations, building out exploits, delivering payloads, tracking penetration testing campaigns, and more.
Read more about:
Black Hat NewsAbout the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024