|
You are here |
bohops.com | ||
| | | | |
www.wietzebeukema.nl
|
|
| | | | | By manipulating environment variables on process level, it is possible to let trusted applications load arbitrary DLLs and execute malicious code. This post lists nearly 100 executables vulnerable to this type of DLL Hijacking on Windows 11 (21H2); it is demonstrated how this can achieved with just three lines of VBScript. | |
| | | | |
redteaming.co.uk
|
|
| | | | | TL;DR - This article is a short run through of how PoshC2's shellcode is automatically generated on the fly using binary patching without the need for continued re-compilation. We'll also go over how we use GitLab CI/CD pipelines to generate the payload files and create the artefact files inside the resources folder, specifically shellcode! DevOps... | |
| | | | |
www.darkoperator.com
|
|
| | | | | ||
| | | | |
blog.fox-it.com
|
|
| | | Fox-IT (part of NCC Group) has uncovered a large-scale exploitation campaign of Citrix NetScalers in a joint effort with the Dutch Institute of Vulnerability Disclosure (DIVD). An adversary appears to have exploited CVE-2023-3519 in an automated fashion, placing webshells on vulnerable NetScalers to gain persistent access. The adversary can execute arbitrary commands with this webshell,... | ||