I am sharing my pentesting exercise regarding ADCS exploitation. There are numerous misconfigurations on ADCS that can be exploited. Today, I will be discussing a
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
I am sharing my pentesting exercise regarding ADCS exploitation. There are numerous misconfigurations on ADCS that can be exploited. Today, I will be discussing a
Hi colleagues and fellow forensic examiners, today I will be sharing some forensic evidence from an exercise I conducted to keep my skills sharp. I
I am doing exercise to ensure that I stay current with recent techniques and vulnerabilities in the field. I will provide insights from both the
Another simple tutorial tonight. CobaltStrike is very flexible C2 framework that allow the adversaries to be so creative in order to develop their arsenal. In
I will be presenting a tutorial on a method for embedding a CobaltStrike shell within the C programming language. I am sharing this information based
In this article, I aim to discuss the process of installing a backdoor on a target system, focusing on various techniques that can be employed