|
You are here |
pentestlab.blog | ||
| | | | |
enigma0x3.net
|
|
| | | | | For those of you who conduct pentests or red team assessments, you are probably aware that there are only so many ways to pivot, or conduct lateral movement to a Windows system. Some of those techniques include psexec, WMI, at, Scheduled Tasks, and WinRM (if enabled). Since there are only a handful of techniques, more... | |
| | | | |
marcusedmondson.com
|
|
| | | | | Today I wanted to cover a subject that has been covered many times before, but writing about the techniques and tools I am learning helps me solidify my knowledge so here we go. Today's post will be about, testing out the PrintNightmare exploit in my homelab through dynamic and remote SSH tunnels. I got the... | |
| | | | |
stefanheule.com
|
|
| | | | | Did you know that the web browser extension you installed a long time ago (say, AdBlock), can probably see all your passwords, look at any website you visit using your credentials and could trivially send all that information to an arbitrary web server? That's pretty scary, and in this blog post I will explain how security for extensions currently works. I will also outline research towards a better extension security model for browsers that protects your sensitive information. | |
| | | | |
www.picussecurity.com
|
|
| | | This blog post provides an in-depth analysis of the top threat actors, the latest malware, vulnerabilities, and exploits observed in the wild during February 2024. | ||