Introduction Windows forensics is traditionally associated with incident response: examining a system after compromise, reconstructing attacker activity, and identifying artifacts left behind. ...
Offensive Windows Forensics
C2AllTheThings
Introduction “C2 All the Things” project is where I researched and listed things an attacker could use as a communication protocol. The idea behind the project is to show how things we use daily co...
Thick Client Domination
Introduction In this article I’ll demonstrate how to show off your own thickness to the application by tearing apart the Damn Vulnerable Thick Client App. Table of Contents Architecture Low h...
PEB For Malware Development
PEB PEB stands for Process Enviornment Block and is a structure in Windows used to hold critical information about a process. It has many fields which can be used for malicious purposes and in favo...
Stealing Windows NTLM with SQLi
in this article I’m gonna show a neat technique that I learned recently while hacking a machine in HackTheBox platform! this technique leverages SMB outbound connection with SQLi to get access to t...
Opiuchi Box Write-up
This is a writeup of opiuchi box hosted on HackTheBox. Information gathering the first phase is information gathering and we don’t really have that in hackthebox but we do know that the machine ...