🔥 Credential Dumping 🔥
Clipboard: https://www.hackingarticles.in/credential-dumping-clipboard/
Local Security Authority: https://www.hackingarticles.in/credential-dumping-local-security-authority-lsalsass-exe/
NTDS.dit https://www.hackingarticles.in/credential-dumping-ntds-dit/
DCSync Attack: https://www.hackingarticles.in/credential-dumping-dcsync-attack/
Windows Autologon Password: https://www.hackingarticles.in/credential-dumping-windows-autologon-password/
Domain Cache Credential: https://www.hackingarticles.in/credential-dumping-domain-cache-credential/
Fake Services: https://www.hackingarticles.in/credential-dumping-fake-services/
Phishing Windows Credentials: https://www.hackingarticles.in/credential-dumping-phishing-windows-credentials/
#infosec #redteaming #cybersecurity #pentest
Clipboard: https://www.hackingarticles.in/credential-dumping-clipboard/
Local Security Authority: https://www.hackingarticles.in/credential-dumping-local-security-authority-lsalsass-exe/
NTDS.dit https://www.hackingarticles.in/credential-dumping-ntds-dit/
DCSync Attack: https://www.hackingarticles.in/credential-dumping-dcsync-attack/
Windows Autologon Password: https://www.hackingarticles.in/credential-dumping-windows-autologon-password/
Domain Cache Credential: https://www.hackingarticles.in/credential-dumping-domain-cache-credential/
Fake Services: https://www.hackingarticles.in/credential-dumping-fake-services/
Phishing Windows Credentials: https://www.hackingarticles.in/credential-dumping-phishing-windows-credentials/
#infosec #redteaming #cybersecurity #pentest
Hacking Articles
Credential Dumping: Clipboard
Learn how attackers use clipboard to dump credentials and how to prevent such attacks in your Windows environment.
Port Forwarding & Tunnelling Cheatsheet
https://www.hackingarticles.in/port-forwarding-tunnelling-cheatsheet/
#infosec #ctf #oscp #pentest #cybersecurity
https://www.hackingarticles.in/port-forwarding-tunnelling-cheatsheet/
#infosec #ctf #oscp #pentest #cybersecurity
Hacking Articles
Port Forwarding & Tunnelling Cheatsheet
Comprehensive Port Forwarding and Tunnelling Cheatsheet covering SSH, Metasploit, Socat, and more for secure connections.
#BurpHacksForBounties - Day 26/30
Красное сердцеUnderstand the different intruder attack types in Burp Suite
With visualizations at code level for better understanding.
Code level understanding in follow up thread 👇
#infosec #appsec #security #cybersecurity #bugbounty #bugbountytips
Красное сердцеUnderstand the different intruder attack types in Burp Suite
With visualizations at code level for better understanding.
Code level understanding in follow up thread 👇
#infosec #appsec #security #cybersecurity #bugbounty #bugbountytips
This media is not supported in your browser
VIEW IN TELEGRAM
#BurpHacksForBounties - Day 28/30 - Super CSRF POC Generator Hack.
CSRF POC generator is only available in Burp Suite pro, but not anymore.
Use this -> https://github.com/merttasci/csrf-poc-generator by @mertistaken
#infosec #burp #appsec #security #bugbountytips #bugbountytip #cybersecurity
CSRF POC generator is only available in Burp Suite pro, but not anymore.
Use this -> https://github.com/merttasci/csrf-poc-generator by @mertistaken
#infosec #burp #appsec #security #bugbountytips #bugbountytip #cybersecurity
Forwarded from Offensive Xwitter
😈 [ pdiscoveryio, ProjectDiscovery.io ]
The Ultimate Guide to Finding Bugs With Nuclei by @v3natoris
https://t.co/2GY3QZlTft
#hackwithautomation #cybersecurity #infosec #bugbounty
🔗 https://blog.projectdiscovery.io/ultimate-nuclei-guide/
🐥 [ tweet ]
The Ultimate Guide to Finding Bugs With Nuclei by @v3natoris
https://t.co/2GY3QZlTft
#hackwithautomation #cybersecurity #infosec #bugbounty
🔗 https://blog.projectdiscovery.io/ultimate-nuclei-guide/
🐥 [ tweet ]
❤🔥3🔥1
Forwarded from Offensive Xwitter
😈 [ fr0gger_, Thomas Roccia 🤘 ]
New EDR/AV evasion technique added to the #UnprotectProject by @Praetorian_GRD "Unloading Module Using FreeLibrary". Check out the detailed description, code snippet and CAPA rule👇 #cybersecurity #malware #infosec cf: @DarkCoderSc
https://t.co/Td7ogFwVcZ
🔗 https://unprotect.it/technique/unloading-module-with-freelibrary/
🐥 [ tweet ]
New EDR/AV evasion technique added to the #UnprotectProject by @Praetorian_GRD "Unloading Module Using FreeLibrary". Check out the detailed description, code snippet and CAPA rule👇 #cybersecurity #malware #infosec cf: @DarkCoderSc
https://t.co/Td7ogFwVcZ
🔗 https://unprotect.it/technique/unloading-module-with-freelibrary/
🐥 [ tweet ]
🔥3
Forwarded from Offensive Xwitter
😈 [ kleiton0x7e, Kleiton Kurti ]
We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.
Blog: https://t.co/m7FNOwV6Nx
#CyberSecurity #redteam #infosec
🔗 https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/
🐥 [ tweet ]
We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.
Blog: https://t.co/m7FNOwV6Nx
#CyberSecurity #redteam #infosec
🔗 https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/
🐥 [ tweet ]
👍7