Combining DLL hijacking with Cobalt Strike Malleable C2 profiles to persist and stay stealthy
Turning an arbitrary file read vulnerability (CVE-2018-1685) into a full Linux host compromise, via Kerberos
Use of Google Apps Script as a proxy for communication with the C&C
In September this year the security researcher Orange Tsai published various...
Analysis and compromise of an RFID scanner used to pivot to the corporate network
Details of the development of a vaccine against Ragnarok malware
Article about how disable_functions works in PHP and how to find bypasses
Technical details about how to pivot through a Microsoft SQL Server