Jump to content

Conti Pentester Guide Leak


SWAT
 Share

Recommended Posts

Conti Pentester Guide Leak

Link: https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak

This repository was created to archive leaked leaked pentesting materials, which were previously given to Conti ransomware group affilates

Mentioned materials covers topics such us:

configure the Rclone software with a MEGA for data exfiltration

configure the AnyDesk software as a persistence and remote access solution into a victim’s network

elevate and gain admin rights inside a company’s hacked network

take over domain controllers

dump passwords from Active Directories

connect to hacked networks via RDP using a Ngrok secure tunnel

install the Metasploit pen-testing framework on a VPS

brute-force routers, NAS devices, and security cameras

configure and use the Cobalt Strike agent

perform a Kerberoasting attack

use the NetScan tool to scan internal networks

disable Windows Defender protections

delete shadow volume copies

configuring operating system to use the Tor and more

Leaked content will give you more insight into how ransomware operators perform their attacks. Futhermore, you can improve your own pentesting skills. Defenders will also benefit from this - you can more eaisly detect and block Conti affilates attacks.

NOTE: Archive containing CobaltStrike crack was removed to please GitHub's Terms of Service.

NOTE2: Materials are written in Russian language (however, due to misspells, threat actor is believed to be Ukrainian citizen)

NOTE3: If something requires password, try "xss.is"

Link to comment
Share on other sites

  • 3 months later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...