unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A Detailed Guide on Medusa
Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, paralle...
2022-4-16 02:7:0 | 阅读: 28 |
收藏
|
www.hackingarticles.in
medusa
username
ignite
logins
Process Doppelganging (Mitre:T1055.013)
IntroductionEugene Kogan and Tal Liberman presented a technique for defense evasion called...
2022-4-15 01:43:9 | 阅读: 18 |
收藏
|
www.hackingarticles.in
memory
windows
payload
dummy
Process Hollowing (Mitre:T1055.012)
IntroductionIn July 2011, John Leitch of autosectools.com talked about a technique he called proce...
2022-4-13 02:5:5 | 阅读: 18 |
收藏
|
www.hackingarticles.in
memory
hollowing
suspended
ppeb
Defense Evasion: Process Hollowing (Mitre:T1055.012)
IntroductionIn July 2011, John Leitch of autosectools.com talked about a technique he called proce...
2022-4-13 02:5:5 | 阅读: 34 |
收藏
|
www.hackingarticles.in
memory
hollowing
suspended
A Detailed Guide on AMSI Bypass
IntroductionWindows developed the Antimalware Scan Interface (AMSI) standard that allows a develop...
2022-4-12 04:27:32 | 阅读: 74 |
收藏
|
www.hackingarticles.in
bypass
powershell
mimikatz
memory
windows
A Detailed Guide on Responder (LLMNR Poisoning)
IntroductionResponder is a widely used tool in penetration test scenarios and can be used for late...
2022-4-10 00:57:55 | 阅读: 173 |
收藏
|
www.hackingarticles.in
responder
llmnr
victim
dhcp
wpad
A Detailed Guide on Cewl
Hi, Pentesters! In this article, we are going to focus on the Kali Linux tool “Cewl” which will bas...
2022-4-8 01:50:31 | 阅读: 48 |
收藏
|
www.hackingarticles.in
cewl
proxy
vulnweb
lowercase
Windows Persistence: COM Hijacking (MITRE: T1546.015)
IntroductionAccording to MITRE, “Adversaries can use the COM system to insert malicious code that...
2022-4-6 17:30:11 | 阅读: 31 |
收藏
|
www.hackingarticles.in
clsid
software
microsoft
machine
Lateral Movement: Remote Services (Mitre:T1021)
IntroductionDuring Red Team assessments, after a compromise has been done, attackers tend to later...
2022-3-28 00:29:50 | 阅读: 49 |
收藏
|
www.hackingarticles.in
remote
lateral
windows
t1021
powershell
Lateral Movement: WebClient Workstation Takeover
IntroductionThe article is based on @tifkin_’s idea that a workstation takeover, also known as lat...
2022-3-25 01:42:9 | 阅读: 36 |
收藏
|
www.hackingarticles.in
responder
webdav
petitpotam
machine
delegation
A Detailed Guide on Crunch
IntroductionOften times attackers have the need to generate a wordlist based on certain criteria w...
2022-3-24 02:26:47 | 阅读: 27 |
收藏
|
www.hackingarticles.in
crunch
lowercase
alphabets
raj
Parent PID Spoofing (Mitre:T1134)
IntroductionParent PID spoofing is an access token manipulation technique that may aid an attacker...
2022-3-20 02:34:57 | 阅读: 42 |
收藏
|
www.hackingarticles.in
spoofing
powershell
windows
reverse
msfvenom
Indirect Command Execution: Defense Evasion (T1202)
IntroductionIndirect Command Execution is a defense evasion technique that is often used by Red Te...
2022-3-18 02:5:2 | 阅读: 35 |
收藏
|
www.hackingarticles.in
windows
reverse
victim
4444
processes
A Detailed Guide on httpx
Introductionhttpx is a fast web application reconnaissance tool coded in go by www.projectidscover...
2022-3-15 02:43:28 | 阅读: 85 |
收藏
|
www.hackingarticles.in
httpx
vulnweb
testphp
webpage
probes
Domain Escalation: Resource Based Constrained Delegation
IntroductionDelegation has been a part of Microsoft’s Active Directory environment since the early...
2022-3-13 02:9:30 | 阅读: 87 |
收藏
|
www.hackingarticles.in
delegation
constrained
ignite
dc1
noob
Linux Privilege Escalation: DirtyPipe (CVE 2022-0847)
IntroductionCVE 2022-0847 is a privilege escalation vulnerability discovered by Max Kellerman pres...
2022-3-10 01:54:1 | 阅读: 90 |
收藏
|
www.hackingarticles.in
splice
traitor
crc
0847
fd1
A Detailed Guide on Wfuzz
IntroductionMany tools have been developed that create an HTTP request and allow a user to modify...
2022-3-6 02:16:26 | 阅读: 117 |
收藏
|
www.hackingarticles.in
wfuzz
testphp
vulnweb
payload
php
File Transfer Filter Bypass: Exe2Hex
IntroductionExe2hex is a tool developed by g0tmilk which can be found here. The tool transc...
2022-2-28 19:50:14 | 阅读: 18 |
收藏
|
www.hackingarticles.in
exe2hex
posh
hexadecimal
upx
victim
Windows Persistence: Shortcut Modification (T1547)
IntroductionAccording to MITRE, “Adversaries may configure system settings to automatically execut...
2022-2-28 14:31:42 | 阅读: 14 |
收藏
|
www.hackingarticles.in
shortcut
sharpersist
powershell
reverse
victim
Domain Escalation: PetitPotam NTLM Relay to ADCS endpoints
IntroductionWill Schroeder and Lee Christensen wrote a research paper on this technique which can...
2022-2-26 01:5:52 | 阅读: 72 |
收藏
|
www.hackingarticles.in
petitpotam
enrolment
ignite
Previous
3
4
5
6
7
8
9
10
Next