Explore >> Select a destination


You are here

thiebaut.dev
| | www.wiz.io
14.2 parsecs away

Travel
| | CI/CD pipelines, as an essential part of the software development process, are an attractive target to malicious actors. Based on our research of cloud environments, we share common misconfigurations and provide tips on how to remediate them in order to prevent supply-chain attacks.
| | pentestarmoury.com
12.0 parsecs away

Travel
| | Introduction and Intent Since watching FireEye FLARE's 'WhyMI So Sexy?' at Derbycon last September, I have wanted to better understand WMI Events and apply them to offensive security operations. I saw the potential, but my comprehension was lacking and a comprehensive offensive WMI toolset did not exist. I was recently taken to school on WMI...
| | pentestlab.blog
9.1 parsecs away

Travel
| | Windows Management Instrumentation (WMI) enables system administrators to perform tasks locally and remotely. From the perspective of red teaming WMI can be used to perform several activities such as lateral movement, persistence, situational awareness, code execution and as a command and control (C2). The fact that WMI is part of Windows that exists in almost...
| | www.preludesecurity.com
54.4 parsecs away

Travel
| Explore MITRE ATT&CK techniques used by Scattered Spider in major recent UK retailer cyberattacks and how to evaluate your own organization's defenses.