|
You are here |
bohops.com | ||
| | | | |
ogmini.github.io
|
|
| | | | | Messing around with Windows Defender just to download and execute LaZagne locally leaves artifacts behind related to exclusions. There are of course other more stealthy ways to run LaZagne by using RATs such as Pupy or Meterpreter/Metasploit. This post will list out the Registry Keys and Event Logs related to Windows Defender. | |
| | | | |
www.cybereason.com
|
|
| | | | | Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data... | |
| | | | |
scriptjunkie.us
|
|
| | | | | [AI summary] The post details eight specific Windows features and services, such as SCM and Task Scheduler, that can be exploited to perform authenticated remote code execution on networked systems. | |
| | | | |
blog.cyber5w.com
|
|
| | | Analysis of CyberGate RAT | ||