hadess

Bitbucket Attack Vector

Bitbucket Attack Vector(EBook)

This technical summary provides a succinct overview of various aspects of Bitbucket security, from understanding and mitigating attack vectors and surfaces to exploring critical paths and API endpoints from a red teaming perspective, and ensuring the secure development and management of Bitbucket plugins. The insights and scenarios presented underscore the importance of a robust security …

Bitbucket Attack Vector(EBook) Read More »

Bitbucket Attack Vector

Bitbucket Attack Vector

Introduction Bitbucket, a widely used Git repository management solution, provides a platform for developers to manage and collaborate on code. However, its extensive functionality and integration capabilities also present numerous attack vectors and surfaces that adversaries might exploit. This APT report outlines potential attack vectors and surfaces within Bitbucket, focusing on the data pipeline, active …

Bitbucket Attack Vector Read More »

The art of Linux persistence

The Art Of Linux Persistence(EBook)

In the realm of Linux system administration, security, and advanced operations, the concept of persistence is pivotal. Persistence in Linux refers to the techniques and methodologies used to maintain continuous operations, automate tasks, ensure the execution of critical processes, and sometimes, in the context of security, maintain access. This comprehensive guide delves into various facets …

The Art Of Linux Persistence(EBook) Read More »

Android Shim Attack Surface

This article delves into the critical role of shims in the Android ecosystem, a platform known for its diversity and fragmentation. Shims, as intermediary layers, are instrumental in ensuring compatibility and functionality across various versions and configurations of Android. The Necessity of Shims in Android’s Fragmented Ecosystem Android’s vast and fragmented landscape presents unique challenges, …

Android Shim Attack Surface Read More »

Android Shim Attack Surface

Android – Understanding the Shim

Android shims are small libraries that act as compatibility layers between different versions of the Android operating system. They allow developers to call newer Android APIs on older platform versions that don’t natively support those APIs.  Shims provide backward compatibility by implementing newer APIs on top of older platform functionality. This enables apps built with …

Android – Understanding the Shim Read More »

Threat Intel Roundup: WebKit, Akira, Kimsuky

Threat Intel Roundup: WebKit, Akira, Kimsuky

Week in Overview(28 Nov-5 Dec) it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate risks associated with various vulnerabilities and threats:

The Art of Windows Persistence(EBook)

This technical summary provides an overview of various Windows persistence methods, highlighting their mechanisms and potential use in cybersecurity, both for offensive and defensive purposes. Account Creation Startup Methods File and System Manipulation Scheduled Tasks Services and DLL Manipulation Advanced Techniques COM Manipulation Accessibility Features Network and System Tools WMI, Active Setup, and IFEO Time-Based …

The Art of Windows Persistence(EBook) Read More »

The art of windows persistence

The Art of Windows Persistence

In the realm of Windows persistence, key findings reveal a diverse and sophisticated array of techniques used by attackers to maintain access to systems. These methods range from simple manipulations like startup folder and registry autorun entries to more complex strategies involving service modification, DLL hijacking, and exploitation of Windows Management Instrumentation (WMI) and Component …

The Art of Windows Persistence Read More »

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.