Let's try and do things like they're done in real attacks. While the media recently was all over ConnectWise ScreenConnect, we instead focus on AnyDesk - which is used by many Cybercriminals these days - in an Assumed Breach scenario.
pentesting
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security Privilege Escalation Persistence Physical Access RedTeam Offensive Security Social Engineering
7 min read
C2 4 min read
Cybersecurity Research We created a custom reverse shell from scratch and made it persistent - the result is scary, to say the least.
7 min read
Cybersecurity Research As promissed, we continue executing code using rundll32 on a fully updated system.
2 min read
Cybersecurity Research Today we're looking at one of the most simple evasions - it's always fascinating to wittness the beauty of traditional hacking exploration methods working to their full extend. The rundll32.exe comma bypass is one of these examples.
2 min read
Pentesting Take a look at our Pentesting and CTF Flowcharts - they should help you especially in the beginning.