Attacking Active Directory: 0 to 0.9 https://zer1t0.gitlab.io/posts/attacking_ad/
DLL Search Order Hijacking https://redcanary.com/threat-detection-report/techniques/dll-search-order-hijacking/
Reverse Engineering 101: CPU, memory, debugging and cheating in minesweeper https://www.youtube.com/watch?v=k8f7DXr0SgQ
XSS in the AWS Console https://frichetten.com/blog/xss_in_aws_console/
Zero Day Zen Garden: Windows Exploit Development - Part 4 [Overwriting SEH with Buffer Overflows] https://www.shogunlab.com/blog/2017/11/06/zdzg-windows-exploit-4.html
Reversing Microsoft’s Windows95 Product Key Check Mechanism https://infosecwriteups.com/reversing-microsofts-windows95-product-key-check-mechanism-ca7e825014b6?gi=beef7f55e435
DLL Search Order Hijacking https://redcanary.com/threat-detection-report/techniques/dll-search-order-hijacking/
Reverse Engineering 101: CPU, memory, debugging and cheating in minesweeper https://www.youtube.com/watch?v=k8f7DXr0SgQ
XSS in the AWS Console https://frichetten.com/blog/xss_in_aws_console/
Zero Day Zen Garden: Windows Exploit Development - Part 4 [Overwriting SEH with Buffer Overflows] https://www.shogunlab.com/blog/2017/11/06/zdzg-windows-exploit-4.html
Reversing Microsoft’s Windows95 Product Key Check Mechanism https://infosecwriteups.com/reversing-microsofts-windows95-product-key-check-mechanism-ca7e825014b6?gi=beef7f55e435
Zaloguj się aby komentować