https://www.praetorian.com/blog/reversing-and-exploiting-embedded-devices-part-1-the-software-stack/
Praetorian
Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) -
The software security of embedded devices is often overlooked. Learn about the common issues allowing bad actors to exploit embedded devices.
Information Security
https://github.com/xforcered/CredBandit
Twitter
Chris Thompson
Finally a way to get in memory LSASS dumps back through your beacon using a novel technique to leverage the BOF BeaconPrintf() function to send directly to the Cobalt Strike team server. Nice work Shawn! github.com/xforcered/Cred…twitter.com/anthemtotheego…