Fingerprinting FreeBSD OS Versions using OpenSSH
In the past, we’ve described how to fingerprint Ubuntu OS Version using OpenSSH. This time, I’ll ...
Read MoreIn the past, we’ve described how to fingerprint Ubuntu OS Version using OpenSSH. This time, I’ll ...
Read MoreOne of the unfortunate parts of a business like ours is when disputes arise from penetration ...
Read MoreMost malware sent via emails is packaged in archives such as ZIP, RAR, and 7z (7-Zip). ...
Read MoreIntroduction In this blog series, I will try to set some base knowledge for Windows system ...
Read MoreAs we mentioned in our earlier blog, Azorult is very popular in the underground hacking forum. ...
Read MoreIn this blog series, we dive into an information stealing Trojan called Azorult that we analyzed ...
Read MoreMicrosoft’s security update for the month of October is one of the lightest patch Tuesdays of the ...
Read MoreChained Critical Everyone gets critical. It’s part of our vernacular: critically injured, critical ...
Read MoreDocuments attached to emails are commonly used as the initial vector to deliver malware into a ...
Read MoreIntroduction A fundamental part of any network is the Domain Name Service (DNS). Adversaries will ...
Read MoreIn this blog, we draw attention to a persistent high-volume spam campaign that has been very ...
Read MoreMicrosoft released an out-of-band patch for a 0-day vulnerability in Internet Explorer yesterday. ...
Read MoreRecently, I set out to find a simple solution to manage the building of all my offensive C# tools ...
Read MoreFor September 2019, Microsoft is releasing 78 CVEs. Of these CVEs, 17 are rated "Critical", 60 ...
Read MoreOverview There are five new credential leaking vulnerabilities discovered and disclosed by Simon ...
Read MoreAfter a bit of a lull in the world of exploit kits, a new exploit kit by the name of “Lord EK” has ...
Read MoreMagecart is the name given to notorious groups of hackers that target online shopping carts, ...
Read MoreThe August Patch Tuesday is here ringing in patches for a massive 97 CVEs. Across those CVEs 31 are ...
Read MoreOver the years, cyber-attacks have become widespread and increasingly sophisticated. This has ...
Read MoreWhile recently upgrading my laptop with a new Solid State Drive (SSD), I installed a management ...
Read MoreOver five years ago, we published a blog detailing how a webshell’s backdoor code was hidden in an ...
Read MoreContext In Mexico, it’s possible to receive your monthly bank statement via email.
Read MoreAre you familiar with an HQL injection exploitation? Chances are you’re not. While you may assume ...
Read MoreIf you've traveled at all within North America, you've likely at some point noticed or even used ...
Read MoreSextortion has been a widely used theme in spam campaigns since Q1 of 2018. From simple crafted ...
Read MorePatch Tuesday for July is here and after the massive release in June, the 77 patches issued this ...
Read MoreRed Teamers like to hunt for new methods of code execution through “legitimate” channels, and I’m ...
Read More