
Recon Fundamentals Expanded (Nahamcon 2022 Talk)

Source link
Related Articles
All Mix →Anything Worth Saying is Worth Owning
I’ve been coming repeatedly to a simple conclusion regarding content creation and the use of social services: If something is worth creating, it’s worth keeping…
On Writing Well as a Software Engineer
Table of Contents Start Read Make your reader finish reading Rewrite Practical tips Though writing is a more creative process than writing code, it does…
Using Credentials to Own Windows Boxes – Part 2 (PSExec and Services)
Table of Contents Testing Credentials and Exploring the Domain SMB Login Using ‘runas’ to get Kerberos auth PSExec Manually PsExec’ing SMBExec Executing commands via services…
UL NO. 440: RAID (Real World AI Definitions)
Table of Contents TOC NOTES MY WORK STORIES IDEAS DISCOVERY RECOMMENDATION OF THE WEEK APHORISM OF THE WEEK SECURITY | AI | MEANING :: Unsupervised…
WordPress Plug-in Threatens 90,000+ websites
A highly concerning security loophole was recently discovered in a WordPress plugin called “Email Subscribers by Icegram Express,” a popular tool utilized by a vast…
State of your attack surface, improved user permissions, and many new tests
Table of Contents TL/DR: We’ve launched a new filter to simplify how you assess the state of your attack surface and made a few other…