Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2024.02.08.md
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991 - https://qriousec.github.io/post/vbox-pwn2own-2023/
Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout - https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout
Visualizing ACLs with Adalanche - https://lsecqt.github.io/Red-Teaming-Army/active-directory/enumeration/visualizing-acls-with-adalanche/
Reverse Engineering Architecture And Pinout of Custom Asics - https://sec-consult.com/blog/detail/reverse-engineering-architecture-pinout-plc/
ADCS Attack Paths in BloodHound — Part 1 - https://specterops.io/blog/2024/01/24/adcs-attack-paths-in-bloodhound-part-1/
#informatyka
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991 - https://qriousec.github.io/post/vbox-pwn2own-2023/
Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout - https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout
Visualizing ACLs with Adalanche - https://lsecqt.github.io/Red-Teaming-Army/active-directory/enumeration/visualizing-acls-with-adalanche/
Reverse Engineering Architecture And Pinout of Custom Asics - https://sec-consult.com/blog/detail/reverse-engineering-architecture-pinout-plc/
ADCS Attack Paths in BloodHound — Part 1 - https://specterops.io/blog/2024/01/24/adcs-attack-paths-in-bloodhound-part-1/
#informatyka
Zaloguj się aby komentować