Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2021.05.28.md
The Full Story of the Stunning RSA Hack Can Finally Be Told - https://www.wired.com/story/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told/
Reverse Engineering Bare Metal Kernel Images with QEMU- Part 1 - https://medium.com/codex/reverse-engineering-bare-metal-low-level-kernel-images-with-qemu-getting-started-c705b7b14d35
Reverse Engineering Bare Metal Firmware Images — Part 2 - https://ragnarsecurity.medium.com/reverse-engineering-bare-metal-kernel-images-part-2-6a52a4afa3ef
A skidalicious cheat sheet of webapp exploitation techniques - https://blog.oxagast.org/posts/skidalicious-webapp-exploit-cheat-sheet/
How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks - https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/
Unveiling DNSStager: A tool to hide your payload in DNS - https://shells.systems/unveiling-dnsstager-a-tool-to-hide-your-payload-in-dns/
Attacking Kubernetes Clusters Through Your Network Plumbing: Part 2 - https://www.cyberark.com/resources/threat-research-blog/attacking-kubernetes-clusters-through-your-network-plumbing-part-2
The Full Story of the Stunning RSA Hack Can Finally Be Told - https://www.wired.com/story/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told/
Reverse Engineering Bare Metal Kernel Images with QEMU- Part 1 - https://medium.com/codex/reverse-engineering-bare-metal-low-level-kernel-images-with-qemu-getting-started-c705b7b14d35
Reverse Engineering Bare Metal Firmware Images — Part 2 - https://ragnarsecurity.medium.com/reverse-engineering-bare-metal-kernel-images-part-2-6a52a4afa3ef
A skidalicious cheat sheet of webapp exploitation techniques - https://blog.oxagast.org/posts/skidalicious-webapp-exploit-cheat-sheet/
How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks - https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/
Unveiling DNSStager: A tool to hide your payload in DNS - https://shells.systems/unveiling-dnsstager-a-tool-to-hide-your-payload-in-dns/
Attacking Kubernetes Clusters Through Your Network Plumbing: Part 2 - https://www.cyberark.com/resources/threat-research-blog/attacking-kubernetes-clusters-through-your-network-plumbing-part-2
Zaloguj się aby komentować