Stealthy and Efficient Data Exfiltration using Google Drive
Data exfiltration is a continual process during the post-exploitation stage. After initial entry, the attacker targets the domain admins. The attackers often...
Data exfiltration is a continual process during the post-exploitation stage. After initial entry, the attacker targets the domain admins. The attackers often...
My plan is fairly simple: read the memory of each process and scan it for static indicators of meterpreter.
Public PowerShell obfuscators like Invoke-Obfuscation and ISE Steroids do not actually rename the function and variable names, which makes easier to use beca...
Kaspersky antivirus is notorious for being difficult to bypass. Black Hills did an interesting blog post where they experienced difficulty bypassing Kasp...
Edit: Google fixed this by introducing a redirect warning page that requires the user to click the redirected link.