|
You are here |
adsecurity.org | ||
| | | | |
marcusedmondson.com
|
|
| | | | | Today I wanted to talk about using the deception technology called New-HoneyHash.ps1. This is a tool that was inspired by Mark Baggett and authored by Matt Graeber, that will inject fake credentials into the lsass.exe process. This can be effective at finding attackers who are dumping the lsass process in your environment in order to... | |
| | | | |
blog.aghanim.net
|
|
| | | | | [AI summary] A collection of notes and resources related to cybersecurity topics such as penetration testing, malware analysis, AV evasion, and ethical hacking, compiled by an individual working on various security-related projects and courses. | |
| | | | |
blog.ropnop.com
|
|
| | | | | I've shown all the different ways to own a Windows environment when you have a password - but having a hash is just as good! Don't bother cracking - PTH! | |
| | | | |
swordbytes.com
|
|
| | | SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application. | ||