|
You are here |
thiebaut.dev | ||
| | | | |
www.wiz.io
|
|
| | | | | CI/CD pipelines, as an essential part of the software development process, are an attractive target to malicious actors. Based on our research of cloud environments, we share common misconfigurations and provide tips on how to remediate them in order to prevent supply-chain attacks. | |
| | | | |
pentestarmoury.com
|
|
| | | | | Introduction and Intent Since watching FireEye FLARE's 'WhyMI So Sexy?' at Derbycon last September, I have wanted to better understand WMI Events and apply them to offensive security operations. I saw the potential, but my comprehension was lacking and a comprehensive offensive WMI toolset did not exist. I was recently taken to school on WMI... | |
| | | | |
pentestlab.blog
|
|
| | | | | Windows Management Instrumentation (WMI) enables system administrators to perform tasks locally and remotely. From the perspective of red teaming WMI can be used to perform several activities such as lateral movement, persistence, situational awareness, code execution and as a command and control (C2). The fact that WMI is part of Windows that exists in almost... | |
| | | | |
www.preludesecurity.com
|
|
| | | Explore MITRE ATT&CK techniques used by Scattered Spider in major recent UK retailer cyberattacks and how to evaluate your own organization's defenses. | ||