Bypassing LSA Protection in Userland – Sec Team Blog
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/
GitHub - Porchetta-Industries/pyMalleableC2: Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.
https://github.com/Porchetta-Industries/pyMalleableC2
https://github.com/Porchetta-Industries/pyMalleableC2
GitHub
GitHub - byt3bl33d3r/pyMalleableC2: Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and…
Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically. - byt3bl33d3r/pyMalleableC2
Weird Ways to Run Unmanaged Code in .NET - XPN InfoSec Blog
https://blog.xpnsec.com/weird-ways-to-execute-dotnet/
https://blog.xpnsec.com/weird-ways-to-execute-dotnet/
XPN InfoSec Blog
@_xpn_ - Weird Ways to Run Unmanaged Code in .NET
Recently I've been looking at the .NET CLR internals and wanted to understand what further techniques may be available for executing unmanaged code from the managed runtime. This post contains a snipped of some of the weird techniques that I found.
A tcpdump Tutorial with Examples — 50 Ways to Isolate Traffic | Daniel Miessler
https://danielmiessler.com/study/tcpdump/
https://danielmiessler.com/study/tcpdump/
Danielmiessler
A tcpdump Tutorial with Examples
tcpdump is the world's premier network analysis tool—combining both power and simplicity into a single command-line interface. This guide will show
ExifTool CVE-2021-22204 - Arbitrary Code Execution | devcraft.io
https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html
https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html
devcraft.io
ExifTool CVE-2021-22204 - Arbitrary Code Execution
Background
Hexacorn | Blog BYOT – Bring Your Own Telemetry
https://www.hexacorn.com/blog/2021/05/20/byot-bring-your-own-telemetry/
https://www.hexacorn.com/blog/2021/05/20/byot-bring-your-own-telemetry/
Dumping RDP Credentials – Penetration Testing Lab
https://pentestlab.blog/2021/05/24/dumping-rdp-credentials/
https://pentestlab.blog/2021/05/24/dumping-rdp-credentials/
Penetration Testing Lab
Dumping RDP Credentials
Administrators typically use Remote Desktop Protocol (RDP) in order to manage Windows environments remotely. It is also typical RDP to be enabled in systems that act as a jumpstation to enable user…