Once made some architecture visualisations - maybe a chance to explain how these came to life and how I discovered: all evasions still work fine.
redteam
As promissed, we continue executing code using rundll32 on a fully updated system.
Today we're looking at one of the most simple evasions - it's always fascinating to wittness the beauty of traditional hacking exploration methods working to their full extend. The rundll32.exe comma bypass is one of these examples.
Discover a simple persistence technique to leverage environment path interception vulnerabilities, using SCRNSAVE.exe to trigger a Sliver mTLS payload. This detailed guide covers the process from identifying the vector to executing the Sliver payload, aimed at offensive security professionals seeking to enhance their toolkit.
Diving deep into the art and science of Social Engineering, exploring its roots in psychology, manipulation tactics, and modern applications. From shocking surprises to exchanging context, uncover the techniques that shape this fascinating field.
Looking into every-day Mail Spoofing, often overlooked world of Email Spoofing, where SPF bypass techniques blur the lines between legitimate communication and cyber threats.