Explore >> Select a destination


You are here

pentestlab.blog
| | enigma0x3.net
11.3 parsecs away

Travel
| | For those of you who conduct pentests or red team assessments, you are probably aware that there are only so many ways to pivot, or conduct lateral movement to a Windows system. Some of those techniques include psexec, WMI, at, Scheduled Tasks, and WinRM (if enabled). Since there are only a handful of techniques, more...
| | marcusedmondson.com
11.0 parsecs away

Travel
| | Today I wanted to cover a subject that has been covered many times before, but writing about the techniques and tools I am learning helps me solidify my knowledge so here we go. Today's post will be about, testing out the PrintNightmare exploit in my homelab through dynamic and remote SSH tunnels. I got the...
| | stefanheule.com
8.6 parsecs away

Travel
| | Did you know that the web browser extension you installed a long time ago (say, AdBlock), can probably see all your passwords, look at any website you visit using your credentials and could trivially send all that information to an arbitrary web server? That's pretty scary, and in this blog post I will explain how security for extensions currently works. I will also outline research towards a better extension security model for browsers that protects your sensitive information.
| | www.picussecurity.com
38.6 parsecs away

Travel
| This blog post provides an in-depth analysis of the top threat actors, the latest malware, vulnerabilities, and exploits observed in the wild during February 2024.