Pwning the Domain: Lateral Movement

Pwning the Domain: Lateral Movement EBook

In summary, lateral movement in the domain of cybersecurity encompasses a myriad of techniques used by attackers to navigate through networks and systems. From password-based attacks to exploitation of authentication vulnerabilities and manipulation of enterprise systems, adversaries employ diverse tactics

Read More
Pwning the Domain: Lateral Movement

Pwning the Domain: Lateral Movement

Lateral movement in red teaming is all about moving between targets in the environment to reach the objective. Password When you find a password you can pass it to different services to check if you can get it. In this

Read More
Loaders Unleashed

Loaders Unleashed EBook

As a bonus, loaders with encoders enhance security and efficiency in software deployment. By encoding loaders, developers can obfuscate their code, mitigating security risks and ensuring the integrity and confidentiality of their applications. Overall, loaders play a critical role in

Read More
Loaders Unleashed

Loaders Unleashed

When developing malware/red teaming tools, it’s often needed to dynamically execute code inside a program. For example executing python code inside a python file. The reason that it’s needed is for evasion, is because when the code is being loaded

Read More
Threat Intel Roundup: XZ, Konni, ALPC, WallEscape

Threat Intel Roundup: XZ, Konni, ALPC, WallEscape

Week in Overview(26 Mar-2 Apr) – 2024 it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate risks associated

Read More

The Crypto Scam

Last year ransomware scammed more than 10 billion dollar from various organizations and users. We decide in this document research methods from seller to end client. This report was made by the Hadess and data comes from various sources such

Read More
Pwning the Domain: DACL Abuse

Pwning the Domain: DACL Abuse EBook

The analysis of permissions within a Windows domain revealed critical security risks. Misconfigurations such as granting GenericAll or GenericWrite permissions on group and user objects can lead to unauthorized access. Additionally, the exploitation of ForceChangePassword misconfiguration allows attackers to reset

Read More
Pwning the Domain: DACL Abuse

Pwning the Domain: DACL Abuse

DACL abuse is about taking advantage of the DACL that is assigned to us on any object that we can abuse. Some mischief that can be done may be changing a user’s password, adding yourself to a group like Domain

Read More
Threat Intel Roundup: FortiCVE, SSL-VPN, Trap, DarkGate

Threat Intel Roundup: FortiCVE, SSL-VPN, Trap, DarkGate

Week in Overview(12 Mar-19 Mar) – 2024 it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate risks associated

Read More
Korenix JETIO 6550 Vulnerabilities

Korenix JETIO 6550 Vulnerabilities EBook

In the realm of network security, vulnerabilities can present significant risks to the integrity and confidentiality of data. CVE-2024-2371, a vulnerability identified within Korenix JetIO, is a prime example of such a threat. Korenix JetIO is a popular industrial Ethernet

Read More

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.