by frank | Jul 31, 2023 | AV, Palo Alto, Red team, Security
Reading Time: < 1 minutecyvrfsfd.sys : Palo Alto Networks cyvrlpc.sys : Palo Alto Networks tedrdrv.sys : Palo Alto Networks cyvrmtgn.sys : Palo Alto Networks cyverak.sys : cyvera, Palo Alto Networks tedrpers-7.???.sys : Palo Alto Networks cyinjct.dll : Palo Alto...
by frank | Jul 7, 2023 | Blue Team, Red team, Security, Windows
Reading Time: 2 minutesLast few days, I’ve been playing with the WFP componant of Windows. WFP = Windows Filtering platform Many informations blogs are existing like the great one from Pavel who really deeped dive into it which I recommand to read Introduction...
by frank | Jun 1, 2023 | Security
Reading Time: 3 minutesThis is under construction Commands to troubleshoot your WEC/WEF Forwardings PS Code to get status of the Listener winrm e winrm/config/listener PS Code to get status of a Forwarding Channel wecutil gr Security Above we see only one Active...
by frank | Jun 1, 2023 | Security
Reading Time: < 1 minuteStep 2.1 : Kibana Download latest release of Kibana here : https://www.elastic.co/cn/downloads/kibana It’s a large zip file. Extract the zip file to C:\Program Files Run a CMD as Admin cd “C:\Program...
by frank | Apr 3, 2023 | Security
Reading Time: < 1 minuteThe following 10 quick wins, will not prevent you to be full 100% hack proof, but I promiss you, if you are able to implement those 10 things, then a hacker will have much more trouble to become a Domain Admin user from a simple User, to...
by frank | Apr 3, 2023 | Security
Reading Time: 2 minutesSummary While there isn’t anything necessarily inherently insecure about AD CS (except for ESC8 as detailed below), it is surprisingly easy to misconfigure its various elements, resulting in ways for unelevated users to escalate in the...
Recent Comments