Resources

  • Unofficial Guide to Mimikatz & Command Reference – adsecurity.org
    This page details as best as possible what each command is, how it works, the rights required to run it, the parameters (required & optional), as well as screenshots and additional context (where possible).
  • juniper-cve-2015-7755 – github.com
    Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS
  • Python Extension – Meterpreter now has a new extension that aims to solve this problem by providing a completely in-memory Python interpreter that can load scripts, run ad-hoc python commands, and also provides bindings to Meterpreter itself.

Techniques

  • A month with Badonions – chloe.re
    A few weeks ago I got the idea of testing how much sniffing is going on in the Tor network by setting up a phishing site where I login with unique password and then store them.
  • Hacking PS4
    Since there haven’t been any major public announcements regarding PS4 hacking for a long time now, I wanted to explain a bit about how far PS4 hacking has come, and what is preventing further progression.

Vulnerabilities

  • Back to 28: Grub2 Authentication 0-Day – hmarco.org
    Grub2 is the bootloader used by most Linux systems including some embedded systems. This results in an incalculable number of affected devices.