Short video series and write-ups on various adversary tactics, offensive tradecraft and exploits.
Bypassing Windows Defender and PPL Protection with PPLBlade to dump LSASS without Detection.
2 Sep 2023
#TA0005 #TA0006 #DefenderBypass
Our favorite zipping tool WinRAR is affected by a vulnerability that could potentially lead to the execution of unauthorized code.
25 Aug 2023
#zeroday #exploit #CVE-2023-38831
Couple of days ago, a cyber security researcher named Max Kellermann published a new privilege escalation vulnerability named DirtyPipe with CVE number 2022-0847.
15 March 2022
#privilege-escalation #exploit #T1068 #CVE-2022-0847
Bypassing Cylance ThreatProtect/Optics by exploiting elevated access to ignore DLL hooking then dumping credentials without creating any alerts. Demonstrated this dirty trick at Nullcon back in 2020.
02 March 2020
#defense-evasion #EDRbypass #TA0005 #dirtyway
Adversary tactics, also known as attack techniques or tradecraft, are the methods, strategies, and techniques employed by malicious actors to compromise systems, networks, or data.
#adversarytactics #adversarytradecraft #TTPs