Over the last weeks we perfected our footprinting tools, OSINT and Recon techniques. Using this information, we map a theoretical attack plan.
evasion
View All RedTeam Cybersecurity Pentesting C2 True Cybercrime Cybersecurity Insights Enumeration Evasion Cybersecurity Research Operational Security Privilege Escalation Physical Access Offensive Security Social Engineering
16 min read
RedTeam 4 min read
Evasion As preparation exercise, building towards evasion using LOL Drivers, we look at IOCTLs on Windows and eject a USB disk.
2 min read
Evasion In our evasion series we take a look at the latest in evasion evolution: Freeze
4 min read
Privilege Escalation KrbRelayUp is a no-fix method for privilege escalation - that's why it's still very interesting and usable.
3 min read
Pentesting Got your new Schmalaxy SXT9000 Smartphone with the great features and security, but it's already boring? Let's bring tools like Metasploit or SQLMap into your Pocket
2 min read
Evasion We already explored many simple pathes to be able to run exe files while bypassing EDR like Defender. Now we go a step further.