|
You are here |
aadinternals.com | ||
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
svirlan.com
|
|
| | | | | Copy Business Central environment using interactive PowerShell script | |
| | | | |
unit42.paloaltonetworks.com
|
|
| | | | | Hildegard is a new malware campaign believed to originate from TeamTNT. It targets Kubernetes clusters and launches cryptojacking operations. | |
| | | | |
blog.ikuamike.io
|
|
| | | Summary As the name suggests this box had a instance of gitlab where the initial foothold involves getting credentials from obfuscated javascript and once logged into the gitlab instance we abuse webhooks to add our own code and execute it to get a reverse shell. Read on to see how I able to root the box. Enumeration As usual I start with a quick nmap scan to find open ports and then run a second scan for service and version detection. | ||