|
You are here |
darkatlas.io | ||
| | | | |
notsosecure.com
|
|
| | | | | In this blog post, Sanjay from the NotSoSecure Training team describes an interesting project where he starts with a path traversal vulnerability, and chains multiple vulnerabilities to achieve remote code execution (RCE) in a .NET web application. | |
| | | | |
scribesecurity.com
|
|
| | | | | Explore recent software supply chain attacks, their impact, and learn effective strategies for prevention. Discover how you can protect your organization | |
| | | | |
forensicitguy.github.io
|
|
| | | | | In this post I want to take a look at a PowerShell-based Cobalt Strike beacon that appeared on MalwareBazaar. This particular beacon is representative of most PowerShell Cobalt Strike activity I see in the wild during my day job. The beacons often show up as service persistence during incidents or during other post-exploitation activity. If you want to follow along at home, the sample I'm using is here: | |
| | | | |
int10h.org
|
|
| | | Font: DOS/V re. JPN30, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles | ||