Once made some architecture visualisations - maybe a chance to explain how these came to life and how I discovered: all evasions still work fine.
redteam
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security RedTeam Privilege Escalation Persistence Physical Access Offensive Security Social Engineering
2 min read
Evasion 7 min read
Cybersecurity Research As promissed, we continue executing code using rundll32 on a fully updated system.
2 min read
Cybersecurity Research Today we're looking at one of the most simple evasions - it's always fascinating to wittness the beauty of traditional hacking exploration methods working to their full extend. The rundll32.exe comma bypass is one of these examples.
2 min read
Social Engineering Diving deep into the art and science of Social Engineering, exploring its roots in psychology, manipulation tactics, and modern applications. From shocking surprises to exchanging context, uncover the techniques that shape this fascinating field.
2 min read
Cybersecurity Insights Looking into every-day Mail Spoofing, often overlooked world of Email Spoofing, where SPF bypass techniques blur the lines between legitimate communication and cyber threats.