C:\Users\mr.d0x> whoami_
Unpatched or misconfigured McAfee components will make life much easier during a penetration test or red team assessment
Continue Reading →A continuation of my series into abusing Microsoft’s debugging tools for red teams. This time I show how to create a memory dump of LSASS with the Adplus debugging tool
Continue Reading →Masquerading execution behind the Microsoft signed binary remote.exe
Continue Reading →A practical example of bypassing Windows Defender’s signature detection by modifying source code
Continue Reading →We’re going to create a C program that downloads a stager and injects it in the running process to establish communication with the attacker’s machine
Continue Reading →