Intro + Use cases Recently, I posted a blogpost over at NVISO’s blog about hiding data in JPEG’s. After the blog post was written, I…
for red teamers, by red teamers
Intro + Use cases Recently, I posted a blogpost over at NVISO’s blog about hiding data in JPEG’s. After the blog post was written, I…
Earlier this week I released a tool based on the work of Wietze Beukema called TrustJack and promised to write a short blogpost about it…
A few weeks ago, I noticed a cool post: https://ired.team/offensive-security/credential-access-and-credential-dumping/credentials-collection-via-creduipromptforcredentials This seemed like an interesting approach to potentially provide a “final shot” when you are…
Were you ever on an engagement where you’ve noticed that the targets are using password managers? Usually password managers work by copying the password over…