Notes On Mac Red Teaming
Some notes after performing red teaming of the Mac environment of an F500 company.
Some notes after performing red teaming of the Mac environment of an F500 company.
If you ever uploaded a live implant to VirusTotal you will notice many callbacks from sandboxes. A common defense faced by attackers is the use of EDRs that ...
I have migrated my blog from Keystone.js to Jekyll. I have also switched from self hosting to using GitHub pages.
Microsoft Word macros are often utilized in spear phishing attacks. These documents typically include a lure to trick the user into clicking “Enable Content....
Data exfiltration is a continual process during the post-exploitation stage. After initial entry, the attacker targets the domain admins. The attackers often...