Pwning the Domain: Persistence

Pwning the Domain: Persistence EBook

Key findings from the “Pwning the Domain” series underscore the pervasive threat posed by attackers leveraging sophisticated techniques to exploit vulnerabilities within Windows domain environments. The series highlights the prevalence of persistence tactics, ranging from Group Policy manipulation and ticket-based

Read More
Pwning the Domain: Persistence

Pwning the Domain: Persistence

In the ongoing battle between attackers and defenders within the realm of cybersecurity, understanding and mitigating persistence techniques is paramount. “Pwning the Domain” is a comprehensive series dedicated to exploring various methods employed by malicious actors to maintain unauthorized access

Read More
Threat Intel Roundup: Cisco, Virtualbox, SSLoad, V8

Threat Intel Roundup: Cisco, Virtualbox, SSLoad, V8

Week in Overview(16 Apr-23 Apr) – 2024 it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate risks associated

Read More
Pwning the Domain: Lateral Movement

Pwning the Domain: Lateral Movement EBook

In summary, lateral movement in the domain of cybersecurity encompasses a myriad of techniques used by attackers to navigate through networks and systems. From password-based attacks to exploitation of authentication vulnerabilities and manipulation of enterprise systems, adversaries employ diverse tactics

Read More
Pwning the Domain: Lateral Movement

Pwning the Domain: Lateral Movement

Lateral movement in red teaming is all about moving between targets in the environment to reach the objective. Password When you find a password you can pass it to different services to check if you can get it. In this

Read More
Loaders Unleashed

Loaders Unleashed EBook

As a bonus, loaders with encoders enhance security and efficiency in software deployment. By encoding loaders, developers can obfuscate their code, mitigating security risks and ensuring the integrity and confidentiality of their applications. Overall, loaders play a critical role in

Read More
Loaders Unleashed

Loaders Unleashed

When developing malware/red teaming tools, it’s often needed to dynamically execute code inside a program. For example executing python code inside a python file. The reason that it’s needed is for evasion, is because when the code is being loaded

Read More
Threat Intel Roundup: XZ, Konni, ALPC, WallEscape

Threat Intel Roundup: XZ, Konni, ALPC, WallEscape

Week in Overview(26 Mar-2 Apr) – 2024 it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate risks associated

Read More

The Crypto Scam

Last year ransomware scammed more than 10 billion dollar from various organizations and users. We decide in this document research methods from seller to end client. This report was made by the Hadess and data comes from various sources such

Read More

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.