Computer accounts lateral movement
https://windowscybersec.com/2020/02/28/computer-accounts-can-move-laterally-too/
https://windowscybersec.com/2020/02/28/computer-accounts-can-move-laterally-too/
‘Cloud Snooper’ Attack Bypasses Firewall Security Measures
https://news.sophos.com/en-us/2020/02/25/cloud-snooper-attack-bypasses-firewall-security-measures/
https://news.sophos.com/en-us/2020/02/25/cloud-snooper-attack-bypasses-firewall-security-measures/
PRACTICAL THREAT HUNTING: DEVELOPING AND RUNNING A
SUCCESSFUL THREAT HUNTING PROGRAM
https://www.slideshare.net/ArpanRaval2/cyber-threat-hunting-workshop-229493446
SUCCESSFUL THREAT HUNTING PROGRAM
https://www.slideshare.net/ArpanRaval2/cyber-threat-hunting-workshop-229493446
SlideShare
Cyber Threat hunting workshop
Cyber Threat hunting workshop - Download as a PDF or view online for free
Windows Privilege Escalation Guide
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
Absolomb
Windows Privilege Escalation Guide
Privilege escalation always comes down to proper enumeration. But to accomplish proper enumeration you need to know what to check and look for. This takes familiarity with systems that normally comes along with experience. At first privilege escalation can…
Sysmon Threat Analysis Guide
https://www.varonis.com/blog/sysmon-and-threat-detection-exploring-the-sysmon-log/
https://www.varonis.com/blog/sysmon-and-threat-detection-exploring-the-sysmon-log/
Inside Out Security
Sysmon Threat Analysis Guide
In my various pentesting experiments, I'll pretend to be a blue team defender and try to work out the attack. If you have good security eyes, you can search for…
Extracting embedded payloads from malware
https://medium.com/@ryancor/extracting-embedded-payloads-from-malware-aaca8e9aa1a9
https://medium.com/@ryancor/extracting-embedded-payloads-from-malware-aaca8e9aa1a9
Medium
Extracting Embedded Payloads From Malware
One of my all time favorite subfields of reverse engineering is the dissection of viruses. In this article I will be exploring malware…
CVE-2020-2555: Deserialization bug in Oracle’s Weblogic server
https://www.thezdi.com/blog/2020/3/5/cve-2020-2555-rce-through-a-deserialization-bug-in-oracles-weblogic-server
https://www.thezdi.com/blog/2020/3/5/cve-2020-2555-rce-through-a-deserialization-bug-in-oracles-weblogic-server
Zero Day Initiative
Zero Day Initiative — CVE-2020-2555: RCE Through a Deserialization Bug in Oracle’s WebLogic Server
Insecure deserialization vulnerabilities have become a popular target for attackers/researchers against Java web applications. These vulnerabilities often lead to reliable remote code execution and are generally difficult to patch. In this blog post, we will…
Forwarded from r0 Crew (Channel)
Canadian Furious Beaver is a tool for hijacking IRPs handler in Windows drivers https://github.com/hugsy/CFB #exploitation #windows #dukeBarman
Exploiting an accidentally discovered V8 RCE
https://zon8.re/posts/exploiting-an-accidentally-discovered-v8-rce/
https://zon8.re/posts/exploiting-an-accidentally-discovered-v8-rce/
zon8.re
Exploiting an Accidentally Discovered V8 RCE
Please start opening your eyes, if you have something that crashes, don’t just ignore it, don’t just click away…
Take the time to look at what happened, if you surf to a page with your web browser and your web browser disappears, and you surf to the page…
Take the time to look at what happened, if you surf to a page with your web browser and your web browser disappears, and you surf to the page…
Callidus. C2 tool that uses O365 services as communication channels
https://3xpl01tc0d3r.blogspot.com/2020/03/introduction-to-callidus.html
https://3xpl01tc0d3r.blogspot.com/2020/03/introduction-to-callidus.html
Blogspot
Introduction to Callidus
Blogs related to information security.