Explore >> Select a destination


You are here

ogmini.github.io
| | adsecurity.org
5.0 parsecs away

Travel
| | [AI summary] The article explains a method to bypass Windows logon security by replacing the Ease of Access Sticky Keys executable with a command prompt to gain system-level access.
| | www.khyrenz.com
4.7 parsecs away

Travel
| | Let me start by saying that, yes: many tools already exist to parse information out of the Windows Registry and/or the Event Log. However, while I was conducting my own tool validation processes (see https://github.com/khyrenz/tool_validation), I realised that very few tools parse this information out and automatically populate the kind of table that I would be adding into my forensic report.So... I did a bit of R&D, and I present to you a Python script that does just that; creatively named pars
| | thinkdfir.com
4.3 parsecs away

Travel
| | In preparation for an upcoming FOR500 class I thought I would test out one of the recent additions to the class. This post by my colleague Zach shows that Win10 1903 and later has a registry key that will store the full path of any executable that utilises the computers camera or microphone. Zach shows...
| | gnn.vircom.in
29.8 parsecs away

Travel
| [AI summary] A critical security vulnerability in Lenovo's preloaded Windows systems allows attackers to bypass AppLocker through a writable MFGSTAT.zip file using Alternate Data Streams.