What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2024-03-29 13:53:15 Ensemble Linux 64 bits et codage de coquille
64-bit Linux Assembly and Shellcoding
(lien direct)
INTRODUCTION Les codes de shell sont des instructions de machine qui sont utilisées comme charge utile dans l'exploitation d'une vulnérabilité.Un exploit est un petit code qui cible
Introduction Shellcodes are machine instructions that are used as a payload in the exploitation of a vulnerability. An exploit is a small code that targets
Vulnerability Threat ★★
Blog.webp 2021-10-16 10:38:51 TheNotebook HackTheBox Walkthrough (lien direct) We'll look at another one of HackTheBox machines today, called “TheNotebook.” It is a medium difficulty box targeting the commonly found threat of using insecure JWT token implementation. A user is able to gain access to the system by forging this token and adding desired values. We'd own the root Threat
Blog.webp 2021-10-12 17:53:31 Armageddon HackTheBox Walkthrough (lien direct) We'll look at another one of HackTheBox machines today, called “Armageddon.” It is an easy box targeting the commonly found threat of using outdated plugins. In this box, an old and vulnerable version of Drupal is showcased. We'd own the root user by targeting it. Here is the methodology. Penetration Threat
Blog.webp 2021-04-19 13:30:38 Domain Persistence: DSRM (lien direct) In this post, we are going to discuss one more Mitre Attack Technique for Tactic ID TA0003 which is used by various of APTs & threat Actors for creating a permanent backdoor in the domain controller. We will check how to use Directory Services Restore Mode (DSRM) for conducting a Threat
Blog.webp 2020-11-18 12:14:27 AlienVault: Threat Hunting/Network Analysis (lien direct) What is threat hunting? The process of threat hunting involves proactively searching for malware or attackers that are hiding within a network. Rather than simply relying on security solutions or services to detect threats, threat hunting is a predictive element to a layered security strategy, empowering organizations to go on the offensive looking for threats.... Continue reading → Malware Threat
Blog.webp 2020-09-26 09:08:29 Threat Hunting: Velociraptor for Endpoint Monitoring (Part 2) (lien direct) In our previous article, we have covered with Velociraptor master server setup with a brief demonstration of Velociraptor installation, GUI interface set up with some of the forensics Artifacts If you didn't read that then don't worry you can visit that article from here. Threat Hunting: Velociraptor for Endpoint Monitoring Once done with a complete... Continue reading → Threat
Blog.webp 2020-09-01 19:43:43 Threat Hunting: Velociraptor for Endpoint Monitoring (lien direct) Velociraptor is a tool for collecting host-based state information using Velocidex Query Language (VQL) queries. To learn more about Velociraptor, read the documentation on https://www.velocidex.com/docs Table of Content Introduction to Velociraptor Architecture What is VQL Prerequisites Velociraptor Environment Velociraptor installation Addition of host forensics investigation / Threat Hunting Introduction to Velociraptor Velociraptor is a free... Continue reading → Tool Threat
Blog.webp 2020-08-19 21:04:06 Threat Intelligence: MISP Lab Setup (lien direct) MISP is an open-source Threat intelligence and sharing platform (formerly known as Malware Information Sharing Platform) that is used for collecting, storing distributing and sharing cybersecurity indicators and threats about cybersecurity incidents & malware analysis. MISP provides facilities to support the exchange of information but also the consumption of information by network intrusion detection systems... Continue reading → Malware Threat
Blog.webp 2020-08-13 18:35:42 Threat Hunting: Log Monitoring Lab Setup with ELK (lien direct) Elastic Stack is formerly known as the ELK Stack. Elk Stack is a collection of free opensource software from Elastic Company which is specially designed for centralized logging. It allows the searching, analyzing, and visualization of logs from different sources.  in this guide, we will learn to install Elastic Stack on ubuntu. To configure ELK... Continue reading → Threat
Blog.webp 2020-06-08 09:51:08 Domain Persistence: DC Shadow Attack (lien direct) In this post, we are going to discuss the most dynamic attack on AD named as DC Shadow attack. It is part of Persistence which create rogue Domain controller in the network. This attack is an actual threat because of This attack leverage into another dynamic attack such as  DCSync Attack and Golden ticket Attack.... Continue reading → Threat
Blog.webp 2020-06-06 15:14:43 Domain Persistence AdminSDHolder (lien direct) In this post, we will discuss the Persistence attack on Active Directory by abusing AdminSDHolder. This attack is an actual threat because of This attack leverage into another dynamic attack such as  DCSync Attack and Golden ticket Attack. AdminSDHolder Active Directory Domain Services uses AdminSDHolder, protected groups and Security Descriptor propagator (SD propagator or SDPROP... Continue reading → Threat
Blog.webp 2020-04-25 16:03:31 Domain Controller Backdoor: Skeleton Key (lien direct) When the many people around were fighting the good fight for Net Neutrality, talented people over Dell SecureWorks Counter Threat Unit or CTU discovered a malware that can bypass the authentication on Active Directory Systems around the world. This poses a threat to all those systems that have implemented a single-factor authentication. Multiple Factor Authentication... Continue reading → Malware Threat
Blog.webp 2020-03-17 13:27:40 A Deep Drive on Proactive Threat Hunting (lien direct) We all know that the proactive threat hunting is need of the hour and as we have already discussed the basic requirement that highlights all generic step required for Threat Hunting Activity in our previous article “Threat Hunting – A proactive Method to Identify Hidden Threat”. In this post, you will learn what are the... Continue reading → Threat
Blog.webp 2020-02-23 18:20:35 Threat Hunting – A proactive Method to Identify Hidden Threat (lien direct) According to ISO 27005, a threat is defined as a potential cause of an incident that may cause harm to systems and organization. Software attacks, theft of intellectual property, identity theft, sabotage, and information extortion are examples of information security threats. As a result, most of the organization chose active threat hunting practice to defend their organization... Continue reading → Threat
Blog.webp 2019-03-30 15:35:03 Threat Detection for your Network using Kfsensor Honeypot (lien direct) In this article, however, we will set up a framework to draw in attacker so we can catch or study them. Since almost the majority of the attackers around the globe are focusing on Windows servers for the various of their known defects and vulnerabilities, we will set up a Windows framework to do only... Continue reading → Threat
Blog.webp 2018-10-30 18:39:00 Xerosploit- A Man-In-The-Middle Attack Framework (lien direct) Networking is an important platform for an Ethical Hacker to check on, many of the threat can come from the internal network like network sniffing, Arp Spoofing, MITM e.t.c, This article is on Xerosploit which provides advanced MITM attack on your local network to sniff packets, steal password etc. Table of Content Introduction to Xerosploit... Continue reading → Threat
Last update at: 2024-04-28 05:07:51
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter