|
You are here |
www.atredis.com | ||
| | | | |
gebir.ge
|
|
| | | | | [AI summary] The provided text describes a detailed process of exploiting a Windows system through a REST API endpoint, leveraging DLL hijacking and dynamic code execution. The user outlines the steps taken to gain access, including crafting malicious DLLs, using reflection to load assemblies, and executing commands via PowerShell. The text concludes with a reflection on the learning experience and resources used. | |
| | | | |
bohops.com
|
|
| | | | | Introduction Last year, I blogged about Investigating .NET CLR Usage Log Tampering Techniques For EDR Evasion. In that part 1 post, we covered: The purpose of .NET Usage Logs and when they are created How Usage Logs are used to detect suspicious activity Several mechanisms for tampering with Usage Logs to avoid log creation and... | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
renato.athaydes.com
|
|
| | | [AI summary] The blog post discusses running WebAssembly (WASM) on the JVM using the asmble compiler and Gradle plugin, highlighting its potential and challenges compared to traditional methods like Emscripten. | ||