|
You are here |
pentestlab.blog | ||
| | | | |
blog.aghanim.net
|
|
| | | | | [AI summary] A collection of notes and resources related to cybersecurity topics such as penetration testing, malware analysis, AV evasion, and ethical hacking, compiled by an individual working on various security-related projects and courses. | |
| | | | |
thinkdfir.com
|
|
| | | | | In preparation for an upcoming FOR500 class I thought I would test out one of the recent additions to the class. This post by my colleague Zach shows that Win10 1903 and later has a registry key that will store the full path of any executable that utilises the computers camera or microphone. Zach shows... | |
| | | | |
macrosec.tech
|
|
| | | | | The first thing we need to do is to identify which dll is crucial for discord to run because that is the dll we will use to perform dll hijacking. In order to find out, we need to open the file location of discord and we see: To identify the COM Keys of Chrome that we can use for COM Hijacking, we use the tool Process Monitor to identify all the processes running when Chrome runs, we also discover the COM servers that are missing CLSID's and the ones which don't require elevated privileges. We use the following filters: | |
| | | | |
pentest-tools.com
|
|
| | | Learn about LDAPNightmare, CVE-2024-49113 and CVE-2024-49112, its impact on Active Directory, how to exploit and mitigate it, and why it matters | ||