In the ever-evolving landscape of cybersecurity, malicious code continues to lurk in the shadows of seemingly innocent web pages. Recently, I encountered a suspicious JavaScript
Abusing SQL Server Impersonation Privileges: A Technical Walkthrough
In this blog post, we explore how attackers can abuse the IMPERSONATE privilege in Microsoft SQL Server to escalate privileges, execute system-level commands, and establish
Exploiting ASP Viewstate on Delivering CobaltStrike
Hi Guys, Just another weekend, and I decided to spend some time on my penetration testing exercise. As I was working on the pentest, I
Powershell Encoding for CobaltStrike
Hellow Friends, I am currently engaged in a small pentesting exercise to make the most of my spare time during the weekend. One topic that
Indirect vs Direct Syscall
Hi Fellows, I have been reading some insightful posts on the internet concerning red teaming exercises. I am particularly interested in topics that delve into
Injecting Payload with Doppelganging
I researched an article and including training materials available on the internet to explore some creative techniques developed by researchers for injecting a malicious payload