Explore >> Select a destination


You are here

blog.cyber5w.com
| | pentestlab.blog
5.5 parsecs away

Travel
| | Group policy preferences allows domain admins to create and deploy across the domainlocal users and local administrators accounts. This feature was introduced in Windows 2008 Server however it can be abused by an attacker since the credentials of theseaccounts are stored encrypted and the public key is published by Microsoft.This leaves the door open to...
| | blog.dingusxmcgee.com
3.1 parsecs away

Travel
| | Today is a quick and fun one, we are going to look at an unassuming .vbs file titled "Scanned-REF23CR1103BILLED.vbs". Surely legitimate business, right?
| | www.wietzebeukema.nl
5.6 parsecs away

Travel
| | PowerShell has built-in functionality to save sensitive plaintext data to an encrypted object called SecureString. Malicious actors have exploited this functionality as a means to obfuscate PowerShell commands. This blog post discusses SecureString, examples seen in the wild, and presents a tool [8] that helps analyse SecureString obfuscated commands.
| | blog.fox-it.com
32.9 parsecs away

Travel
| Fox-IT (part of NCC Group) has uncovered a large-scale exploitation campaign of Citrix NetScalers in a joint effort with the Dutch Institute of Vulnerability Disclosure (DIVD). An adversary appears to have exploited CVE-2023-3519 in an automated fashion, placing webshells on vulnerable NetScalers to gain persistent access. The adversary can execute arbitrary commands with this webshell,...