Skip content

61 70 162 results

Filter by

  • VM Detection Tricks, Part 3: Hyper-V RAW Network Protocol

    This month’s virtual machine detection trick involves detecting the presence of the Hyper-V RAW network protocol. This protocol...

    Read more
  • VM Detection Tricks, Part 2: Driver Thread Fingerprinting

    This year we’re documenting a series of new and as-yet undocumented VM detection tricks. These detection tricks will...

    Read more
  • CVE-2020-24550: Open Redirect in Episerver Find

    During the course of our work, we discovered an open redirect vulnerability in Episerver Find. This has...

    Read more
  • Introducing FComm - C2 Lateral Movement

    Over the past few years, we have found a few edge cases where the traditional lateral movement communication...

    Read more
  • VM Detection Tricks, Part 1: Physical memory resource maps

    In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021....

    Read more
  • PoshC2 Improved HTML Reports

    Red team operators need detailed and accurate C2 report output in order to conduct high quality work. Consequently,...

    Read more
  • CVE-2020-14418: madCodeHook Library Local Privilege Escalation

    Nettitude discovered a vulnerability in the ‘madCodeHook’ third party library which caused a number of security products, including...

    Read more
  • CVE-2020-27708: Electronic Arts (EA) Origin - Local Privilege Escalation

    We recently assessed the security posture of Electronic Arts Origin Client and discovered a privilege escalation issue that...

    Read more
  • Introducing PoshC2 v7.0

    There have been some big improvements and new features added to PoshC2 and we’re excited to announce the...

    Read more
  • Detecting PoshC2 - Indicators of Compromise

    As a counterpart to the release of PoshC2 version 6.0 we are providing a list of some of...

    Read more

Error

Error

No results found

No results found that match your query

Loading results