Author: blog_h4ck

Author | Cybersecurity enthusiast | Corporate trainer | Cybersecurity consultant | Speaker | Professional Coach | OSCP | CISA | CCSP | ISO 27001 LA | OSWP | GPEN |
windows attack 0

Windows Attack Anatomy

Incorrect permissions in services Find unquoted paths ClearText passwords Pass the hash AlwaysInstallElevated Port Forwarding Vulnerable drivers Kernal Exploits Automated tools Powersploit Metasploit Incognito Rottenpotato Tater Mimikatz Empire...


Cloud Insecurities & defenses

With the advent of new and new technologies, organizations are finding new and creative ways of saving money, value and increasing the profit. In this world of new...

windows explloit 0

Windows Kernel Exploitation – part 4 | Vulnerabilities

Common Vulnerabilities and Exposure MS08-067 (NetAPI) Check the vulnerability with the following nmap script. nmap -Pn -p445 –open –max-hostgroup 3 –script smb-vuln-ms08-067 <ip_netblock> Metasploit modules to exploit MS08-067 NetAPI. exploit/windows/smb/ms08_067_netapi If you...

windwos 0

Windows privilege escalation – part 3 | Kernal-Exploits

EoP – Kernel Exploitation List of exploits kernel : #Security Bulletin   #KB     #Description    #Operating System MS17-017  [KB4013081]  [GDI Palette Objects Local Privilege Escalation]  (windows 7/8) CVE-2017-8464  [LNK Remote Code Execution Vulnerability]  (windows 10/8.1/7/2016/2010/2008) CVE-2017-0213  [Windows COM...

Editor Picks