C2AllTheThings “C2 All the Things” project is where I researched and listed things an attacker could use as a communication protocol. The idea behind the project is to show how things we use daily ...
C2AllTheThings
Thick Client Domination
Introduction In this article I’ll demonstrate how to show off your own thickness to the application by tearing apart the Damn Vulnerable Thick Client App. Table of Contents Architecture Low h...
PEB For Malware Development
PEB PEB stands for Process Enviornment Block and is a structure in Windows used to hold critical information about a process. It has many fields which can be used for malicious purposes and in favo...
Stealing Windows NTLM with SQLi
in this article I’m gonna show a neat technique that I learned recently while hacking a machine in HackTheBox platform! this technique leverages SMB outbound connection with SQLi to get access to t...
Opiuchi Box Write-up
This is a writeup of opiuchi box hosted on HackTheBox. Information gathering the first phase is information gathering and we don’t really have that in hackthebox but we do know that the machine ...