10. While reviewing options for wrapping nefarious activities in a trusted process, @_xpn_ came across, what he's now calling, "Object Overloading." Read his #blog post on how he came up with this name and what the technique achieves!
trustedsec.com
trustedsec.com
9. Follow along with @4ndr3w6S and @exploitph as they re-worked an older Kerberos attack technique and weaponized it into a new Rubeus command.
trustedsec.com
trustedsec.com
8. Continuing with some cross-site scripting (XSS) fun, @hoodoer demonstrated how to capture credentials from a login form using an IFrame trap. trustedsec.com
7. 03/29/22: After the #Spring4Shell vulnerability was disclosed, @cyberGoatPsyOps provided guidelines & recommendations to prevent, detect & mitigate the vulnerability. trustedsec.com
6. Is #Mimikatz giving you away when changing users' passwords? @n00py1 is familiar with this scenario! Rodriguez focused on resetting passwords for lateral movement or privilege escalation in this #blog.
trustedsec.com
trustedsec.com
5. Windows Management Instrumentation or Infrastructure (#WMI) in this blog for script kiddies! Learn how there is a way for you to manipulate and observe system data today.
trustedsec.com
trustedsec.com
4. Go on a journey with @Oddvarmoe as he uses his legacy knowledge to abuse pre-created computer accounts that could potentially let you escalate privileges.
trustedsec.com
trustedsec.com
3. Streamline your Burp Suite Pro workflow and improve your testing using these helpful features put together by the TrustedSec Software Security team.
trustedsec.com
trustedsec.com
2. @bandrel publicly debuted SeeYouCM-Thief. Learn how to #exploit common misconfigurations in #Cisco phone systems using this new open-source tool.
trustedsec.com
trustedsec.com
1. We debuted Orpheus, a new bypass written by @Ben0xA which alters the KDC Options (Ticket Options) and the Encryption Type for #Kerberoasting.
trustedsec.com
trustedsec.com
Bonus: Top viewed blog published before 2022: @_Kc57 released iHide on Sept. 2, 2021, a new tool for bypassing jailbreak detection in iOS applications.
trustedsec.com
trustedsec.com
Loading suggestions...