I am sharing my pentesting exercise regarding ADCS exploitation. There are numerous misconfigurations on ADCS that can be exploited. Today, I will be discussing a
by Rio Asmara Suryadi
I am sharing my pentesting exercise regarding ADCS exploitation. There are numerous misconfigurations on ADCS that can be exploited. Today, I will be discussing a
Hi colleagues and fellow forensic examiners, today I will be sharing some forensic evidence from an exercise I conducted to keep my skills sharp. I
I would like to share a basic tutorial on reverse engineering related to Windows API calls. This tutorial will involve reviewing a substantial amount of
Just to continue from my previous post, I conducted an exercise involving the exploitation of a host specifically designed to contain two vulnerabilities: CVE-2023-38146 and
I am doing exercise to ensure that I stay current with recent techniques and vulnerabilities in the field. I will provide insights from both the
This is yet another technique for injecting payloads into memory. We recognize that the majority of the techniques used involve similar steps. Nowadays, EDR is