Exploitation 12
- What’s in a Name? Writing custom DNS tunnelling protocol, exploiting unexpected AWS Lambda misconfiguration – in a web app Pen test (Part 2)
- What’s in a Name? Writing custom DNS tunnelling protocol, exploiting unexpected AWS Lambda misconfiguration – in a web app Pen test (Part 1)
- Advisory CVE-2023-43042 – IBM Backup Products Superuser Information Disclosure
- Advisory: IDOR in Microsoft Teams Allows for External Tenants to Introduce Malware
- Butting Heads with a Threat Actor on an Engagement
- Car Hacking – Manual Bypass of Modern Rolling Code Implementations
- Pwning Windows Event Logging with YARA rules
- Defending Your Malware
- shad0w
- A Defender’s Guide For Rootkit Detection: Episode 1 – Kernel Drivers
- CVE 2015-7547 glibc getaddrinfo() DNS Vulnerability
- Playing with MS14-060 and MS14-058 [CVE-2014-4113 CVE-2014-4114] : Attacks and Defenses