Red Teaming Mind Map from The Hacker Playbook 3 – Marco Lancini
https://www.marcolancini.it/2018/blog-hacker-playbook-mindmap/
https://www.marcolancini.it/2018/blog-hacker-playbook-mindmap/
Marco Lancini's Blog
Red Teaming Mind Map from The Hacker Playbook 3 | Marco Lancini's Blog
A high-level mind map to summarize all the techniques/tools covered by Peter Kim’s book.
SMB hash hijacking & user tracking in MS Outlook
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/may/smb-hash-hijacking-and-user-tracking-in-ms-outlook/
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/may/smb-hash-hijacking-and-user-tracking-in-ms-outlook/
Alternative methods of becoming SYSTEM
https://blog.xpnsec.com/becoming-system/
https://blog.xpnsec.com/becoming-system/
XPN InfoSec Blog
@_xpn_ - Alternative methods of becoming SYSTEM
For many pentesters, Meterpreter's getsystem command has become the default method of gaining SYSTEM account privileges, but have you ever have wondered just how this works behind the scenes? In this post I will show the details of how this technique works…
Reflected XSS on ws-na.amazon-adsystem.com(Amazon) – newp_th – Medium
https://medium.com/@newp_th/reflected-xss-on-ws-na-amazon-adsystem-com-amazon-f1e55f1d24cf
https://medium.com/@newp_th/reflected-xss-on-ws-na-amazon-adsystem-com-amazon-f1e55f1d24cf
Medium
Reflected XSS on ws-na.amazon-adsystem.com(Amazon)
This is @newp_th.This issue is very similar to my previous report on Reflected XSS on Stack Overflow.
Advanced Threat Tactics – Course and Notes | Strategic Cyber LLC
https://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/
https://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/
Expert published a PoC exploit code for RCE flaw in Microsoft Edge
https://securityaffairs.co/wordpress/79264/hacking/microsoft-edge-poc-exploit.html
https://securityaffairs.co/wordpress/79264/hacking/microsoft-edge-poc-exploit.html
Security Affairs
Expert published a PoC exploit code for RCE flaw in Microsoft Edge
The security researcher Bruno Keith from the Phoenhex group published a PoC code for a remote code execution flaw in Microsoft Edge browser (CVE-2018-8629).
Automating AD Enumeration – InfoSec Write-ups – Medium
https://medium.com/bugbountywriteup/automating-ad-enumeration-with-frameworks-f8c7449563be
https://medium.com/bugbountywriteup/automating-ad-enumeration-with-frameworks-f8c7449563be
Medium
Automating AD Enumeration
Doing everything manually is cool, but how do we save time and money? A lot of times most of the enumeration stuff can be automated. But…
Introduction · Dostoevskylabs Pentest Notes
https://dostoevskylabs.gitbooks.io/dostoevskylabs-pentest-notes/content/
https://dostoevskylabs.gitbooks.io/dostoevskylabs-pentest-notes/content/
dostoevskylabs.gitbooks.io
Introduction · Dostoevskylabs Pentest Notes
Exploit Development - InfoSec Reference
https://rmusser.net/docs/Exploit%20Development.html
https://rmusser.net/docs/Exploit%20Development.html
Hunting for Privilege Escalation in Windows Environment - Speaker Deck
https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
Speaker Deck
Hunting for Privilege Escalation in Windows Environment
Slides from my talk at the OFFZONE 2018 conference (https://www.offzone.moscow/report/hunting-for-privilege-escalation-in-windows-environment/)
GitHub - sundowndev/hacker-roadmap: A guide for amateurs pen testers and a collection of hacking tools, resources and references to practice ethical hacking, pen testing and web security.
https://github.com/sundowndev/hacker-roadmap
https://github.com/sundowndev/hacker-roadmap
GitHub
GitHub - sundowndev/hacker-roadmap: A collection of hacking tools, resources and references to practice ethical hacking.
A collection of hacking tools, resources and references to practice ethical hacking. - sundowndev/hacker-roadmap
The Enigmatic “Roma225” Campaign – Yoroi Blog
https://blog.yoroi.company/research/the-enigmatic-roma225-campaign/
https://blog.yoroi.company/research/the-enigmatic-roma225-campaign/
Yoroi
The Enigmatic “Roma225” Campaign - Yoroi
Introduction The Cybaze-Yoroi ZLab researchers investigated a recent espionage malware implant weaponized to target companies in the Italian automotive sector. The malware was spread through well written phishing email trying to impersonate a senior partner…
How I was able to delete Google Gallery Data [IDOR]
https://medium.com/@yogeshtantak7788/how-i-was-able-to-delete-google-gallery-data-idor-53d2f303efff
https://medium.com/@yogeshtantak7788/how-i-was-able-to-delete-google-gallery-data-idor-53d2f303efff
Medium
How I was able to delete Google Gallery Data [IDOR]
Hi, This is Yogesh Tantak a Security Researcher from India. Today I am writing about a critical bug that I found in Google’s new Product…
Bypassing Windows User Account Control – d3struct0 – Medium
https://www.peerlyst.com/posts/bypassing-windows-user-account-control-ian-barwise-m-s-cissp-ceh-cnda
https://www.peerlyst.com/posts/bypassing-windows-user-account-control-ian-barwise-m-s-cissp-ceh-cnda
How to bypass AMSI and execute ANY malicious Powershell code | zc00l blog
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
zc00l blog
How to bypass AMSI and execute ANY malicious Powershell code
Hello again. In my previous posts I detailed how to manually get SYSTEM shell from Local Administrators users. That’s interesting but very late game during a penetration assessment as it is presumed that you already owned the target machine.
How to perform the static analysis of website source code with the browser — the beginner’s bug…
https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
Yes, More Callbacks — The Kernel Extension Mechanism
https://medium.com/yarden-shafir/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a
https://medium.com/yarden-shafir/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a
Medium
Yes, More Callbacks — The Kernel Extension Mechanism
Recently I had to write a kernel-mode driver. This has made a lot of people very angry and been widely regarded as a bad move. (Douglas…
A Review of my Bug Hunting Journey - My Learning Journey
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
https://kongwenbin.com/a-review-of-my-bug-hunting-journey/
My Learning Journey
A Review of my Bug Hunting Journey
A review of my bug hunting journey so far, from when I started, to the point where I made it into the Top 200 bug hunters on Bugcrowd after two years.
Sputnik — An Open Source Intelligence Browser Extension
https://medium.com/bugbountywriteup/sputnik-an-open-source-intelligence-browser-extension-da2f2c22c8ec
https://medium.com/bugbountywriteup/sputnik-an-open-source-intelligence-browser-extension-da2f2c22c8ec
Medium
Sputnik — An Open Source Intelligence Browser Extension
Summary