by frank | Jan 25, 2022 | Security
Reading Time: < 1 minuteFollowing reading an article from @CyberWarship : https://twitter.com/CyberWarship/status/1485623439633362946 The following test was done in my lab. in a share that users are connected on, create a file called...
by frank | Jan 24, 2022 | Blue Team, Red team, Security, Windows
Reading Time: 6 minutesIn this post, I will explore the RBCD WebClient attack which has been described in many tweets and other forums, but I wanted to understand the main intricasis as I was learning it during a pentest engagement I had the chance to work on. I...
by frank | Dec 30, 2021 | Security
Reading Time: < 1 minuteA tiny articles to show that I implemented a Log4J scanner into XDR as a script you can run. XDR is not a vulnerability management tool, even do host-insight offers some kind of list of vulnerabilities. I used the original code created by...
by frank | Oct 26, 2021 | Security
Reading Time: 2 minutesThis will be a very very small note article. When running Responder you might have gotten back hashes or while dumping LSASS memory or doing a DCSync. You might have read about the value : AAD3B435B51404EEAAD3B435B51404EE or from the NTDIS file...
by frank | Sep 16, 2021 | Security
Reading Time: 4 minutesPart 1 out of 3 WEC = WEF = Windows event collection are different words but are all refering to the same functionality. If there is one thing I’ve learned over the last year. Hardly nobody has a full proof cybersecurity system. And I read...
Recent Comments