Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2023.05.18.md
How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks - https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/
MDE Hunting 101 - https://emptydc.com/2022/03/27/mde-hunting-101/
Detecting and decrypting Sliver C2 – a threat hunter’s guide - https://www.immersivelabs.com/blog/detecting-and-decrypting-sliver-c2-a-threat-hunters-guide/
Active Directory Spotlight: Attacking Microsoft's Configuration Manager (SCCM/MECM) - https://www.securesystems.de/blog/active-directory-spotlight-attacking-the-microsoft-configuration-manager/
Analysis of CLR SqlShell Used to Attack MS-SQL Servers - https://asec.ahnlab.com/en/52479/
#informatyka
How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks - https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/
MDE Hunting 101 - https://emptydc.com/2022/03/27/mde-hunting-101/
Detecting and decrypting Sliver C2 – a threat hunter’s guide - https://www.immersivelabs.com/blog/detecting-and-decrypting-sliver-c2-a-threat-hunters-guide/
Active Directory Spotlight: Attacking Microsoft's Configuration Manager (SCCM/MECM) - https://www.securesystems.de/blog/active-directory-spotlight-attacking-the-microsoft-configuration-manager/
Analysis of CLR SqlShell Used to Attack MS-SQL Servers - https://asec.ahnlab.com/en/52479/
#informatyka
Zaloguj się aby komentować