【翻译】The Key to COMpromise - Writing to the Registry (again), Part 4 — NeodymeCOMpromise - 利用 TOCTOU ...
COMpromise - 利用 TOCTOU 竞争获取 SYSTEM 权限
【翻译】The Key to COMpromise - Abusing a TOCTOU race to gain SYSTEM, Part 2 — Neodyme 回顾在本系列博客的第一篇文章中,我...
COMpromise - 通过劫持 COM 接口攻击防病毒软件和 EDR
【翻译】The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1 — Neodyme 引言防病毒软...
NTLM 中继到 LDAP - The Hail Mary of Network Compromise
NTLM 中继攻击是一种 MITM 攻击,通常涉及某种形式的身份验证强制,攻击者诱使主机向攻击者控制的机器进行身份验证,然后将身份验证中继到目标设备、资源或服务,从而有效地冒充主机。这种类型的攻击对 ...
网络威胁的现实故事:七个案例的安全教训
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities ...