Explore >> Select a destination


You are here

www.securitynik.com
| | diverto.github.io
4.5 parsecs away

Travel
| | Printing systems are an often overlooked target for attackers looking to establish command and control (C2) channels on a victim's network. An attacker can abuse the operating system's printing system to add and remove printers and create and manipulate printing jobs to achieve full C2 communication. We have developed a complete proof of concept of such a solution that we have successfully tested in real-world red teaming exercises. By understanding the approach taken in this specific abuse of printing systems, we can take steps to secure them and prevent them from being exploited by malicious actors.
| | blog.flanker017.me
1.2 parsecs away

Travel
| | Testing Empire as post-exploitation framework in domain environment Due to recent research on Red-Blue Team Operations, I became interested in various post-exploitation framework. Since the widely ...
| | taeluralexis.com
3.0 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | www.coveware.com
22.5 parsecs away

Travel
| In Q2 2023 a series of ransomware attacks by similar threat actors created headlines and blurred the lines of attribution.