Mimikatz Comprehensive Cheatsheet

Mimikatz Comprehensive Guide

In the ever-evolving landscape of cybersecurity, the tools and techniques employed by both defenders and attackers are constantly advancing. Among the myriad of tools available, Mimikatz stands out as a particularly powerful and versatile utility that has become a staple in the arsenals of both security professionals and malicious actors. Developed by Benjamin Delpy, Mimikatz…

Read More
Pwning the Domain: AD CS

Pwning the Domain: AD CS

Active Directory Certificate Services (AD CS) is a crucial component of enterprise security infrastructure, providing services for public key cryptography. However, misconfigurations and vulnerabilities within AD CS can be exploited for domain escalation, persistence, and certificate theft. These exploits leverage weaknesses in certificate templates, enrollment services, access control lists (ACLs), and other AD CS components….

Read More
SIM Swap Attack

SIM Swap attacks

Introduction SIM Swap attacks are well known to cybersecurity professionals. They allow an attacker to take control of the victim’s SIM card, enabling them to validate online payments or change the victim’s account passwords. This type of attack is widespread and has caused significant damage worldwide. Recently, in January 2024, the X account of the…

Read More
Pwning the Domain: Persistence

Pwning the Domain: Persistence

In the ongoing battle between attackers and defenders within the realm of cybersecurity, understanding and mitigating persistence techniques is paramount. “Pwning the Domain” is a comprehensive series dedicated to exploring various methods employed by malicious actors to maintain unauthorized access within Windows domain environments. This article focuses specifically on persistence techniques, shedding light on the…

Read More
Loaders Unleashed

Loaders Unleashed

When developing malware/red teaming tools, it’s often needed to dynamically execute code inside a program. For example executing python code inside a python file. The reason that it’s needed is for evasion, is because when the code is being loaded like that, it resides in memory so AV/EDR has more overhead when examining the process….

Read More

The Crypto Scam

Last year ransomware scammed more than 10 billion dollar from various organizations and users. We decide in this document research methods from seller to end client. This report was made by the Hadess and data comes from various sources such as: Dark Web , Deep Web Forums, Sellers and Websites. Summary of Finding Abbrev. Wallet…

Read More
Pwning the Domain: DACL Abuse

Pwning the Domain: DACL Abuse

DACL abuse is about taking advantage of the DACL that is assigned to us on any object that we can abuse. Some mischief that can be done may be changing a user’s password, adding yourself to a group like Domain Admins, granting yourself full control over an object and many more. DACL abuse can be…

Read More
Pwning the Domain: Kerberos Delegation

Pwning the Domain: Kerberos Delegation

Pwning the Domain: Kerberos Delegation In this article we’ll talk about Kerberos Delegation and how to abuse it in various ways and escalate our privileges. What is Kerberos delegation? Kerberos delegation is a type of credential delegation that is used for securely delegating a user’s credential form a client application to a target server application….

Read More
Web LLM Attacks

Web LLM Attacks

The integration of Large Language Models (LLMs) into online platforms presents a double-edged sword, offering enhanced user experiences but also introducing security vulnerabilities. Insecure output handling is a prominent concern, where insufficient validation or sanitization of LLM outputs can lead to a range of exploits like cross-site scripting (XSS) and cross-site request forgery (CSRF). Indirect…

Read More
Pwning the Domain: With Credentials

Pwning the Domain: With Credentials

Domain Account After getting access to a domain account, there are a variety of things that can be done including but not  limited to: domain enumeration, Kerberoasting, coercion, etc. Enumeration There are many options for enumerating the domain once you have an account: BloodHound BloodHound is a go-to tool when it comes to enumeration in…

Read More

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.