Explore >> Select a destination


You are here

adsecurity.org
| | marcusedmondson.com
3.6 parsecs away

Travel
| | Today I wanted to talk about using the deception technology called New-HoneyHash.ps1. This is a tool that was inspired by Mark Baggett and authored by Matt Graeber, that will inject fake credentials into the lsass.exe process. This can be effective at finding attackers who are dumping the lsass process in your environment in order to...
| | blog.aghanim.net
4.0 parsecs away

Travel
| | [AI summary] A collection of notes and resources related to cybersecurity topics such as penetration testing, malware analysis, AV evasion, and ethical hacking, compiled by an individual working on various security-related projects and courses.
| | blog.ropnop.com
4.0 parsecs away

Travel
| | I've shown all the different ways to own a Windows environment when you have a password - but having a hash is just as good! Don't bother cracking - PTH!
| | swordbytes.com
31.8 parsecs away

Travel
| SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application.