Skip content

61 70 187 results

Filter by

  • How jwt hijacking can be prevented

    JSON Web Tokens (JWTs) are commonly used in many applications to validate the client's identity. However, there are...

    Read more
  • PoshC2 - Introducing Native macOS Implants

    Over the past few years, we have seen an increase in the number of macOS environments we are...

    Read more
  • VM Detection Tricks, Part 3: Hyper-V RAW Network Protocol

    This month’s virtual machine detection trick involves detecting the presence of the Hyper-V RAW network protocol. This protocol...

    Read more
  • VM Detection Tricks, Part 2: Driver Thread Fingerprinting

    This year we’re documenting a series of new and as-yet undocumented VM detection tricks. These detection tricks will...

    Read more
  • CVE-2020-24550: Open Redirect in Episerver Find

    During the course of our work, we discovered an open redirect vulnerability in Episerver Find. This has...

    Read more
  • Introducing FComm - C2 Lateral Movement

    Over the past few years, we have found a few edge cases where the traditional lateral movement communication...

    Read more
  • VM Detection Tricks, Part 1: Physical memory resource maps

    In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021....

    Read more
  • PoshC2 Improved HTML Reports

    Red team operators need detailed and accurate C2 report output in order to conduct high quality work. Consequently,...

    Read more
  • The fireeye hack

    With the recent hack of FireEye, there have been many questions circulating among cyber security experts and the...

    Read more
  • CVE-2020-14418: madCodeHook Library Local Privilege Escalation

    Nettitude discovered a vulnerability in the ‘madCodeHook’ third party library which caused a number of security products, including...

    Read more

Error

Error

No results found

No results found that match your query

Loading results