Spotting a Fake Exploit
Backround On April 12, 2022 Microsoft Announced CVE-2022-24500, a Windows SMB Remote Code Execution Vulnerability. The […]
Backround On April 12, 2022 Microsoft Announced CVE-2022-24500, a Windows SMB Remote Code Execution Vulnerability. The […]
Here is a nice article on privilege escalation in Ubuntu 20.04: https://securitylab.github.com/research/Ubuntu-gdm3-accountsservice-LPE
F-Secure has created a free tool that automates the detection and removal of the widespread Flashback Mac OS […]
Honeynet/Honeywall Implementation Routing of malicious traffic and forensic analysis Steve Stonebraker 11/22/2010 A detailed implementation […]
Background SQL Server has a function called CAST, that converts an ASCII codes array to text. […]
Here is an FTDNS example (File Transfer via DNS) from Johannes B. Ullrich, Ph.D. (http://isc.sans.edu/diary.html?storyid=10306): File […]
Background Before you can be a badass hacker you need to understand what exactly it is […]
GNS3 is a graphical network simulator that allows simulation of complex networks. To allow complete simulations, […]
Recent Spanning Tree Protocol (STP) attack: Tool being shown: http://www.yersinia.net/ Attack 1: Taking over the root […]
Background Before you can be a badass hacker you need to understand what exactly it is […]