Resources
- Unofficial Guide to Mimikatz & Command Reference – adsecurity.org
This page details as best as possible what each command is, how it works, the rights required to run it, the parameters (required & optional), as well as screenshots and additional context (where possible).
- Index of /docs/Slides/2015 – deepsec.net
- CVE-2015-8446 (Flash up to 19.0.0.245) And Exploit Kits – malware.dontneedcoffee.com
- juniper-cve-2015-7755 – github.com
Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS
- Software Defined Radio with HackRF, Lesson 11 – greatscottgadgets.com
- Python Extension – Meterpreter now has a new extension that aims to solve this problem by providing a completely in-memory Python interpreter that can load scripts, run ad-hoc python commands, and also provides bindings to Meterpreter itself.
Techniques
- A month with Badonions – chloe.re
A few weeks ago I got the idea of testing how much sniffing is going on in the Tor network by setting up a phishing site where I login with unique password and then store them.
- Hacking PS4
Since there haven’t been any major public announcements regarding PS4 hacking for a long time now, I wanted to explain a bit about how far PS4 hacking has come, and what is preventing further progression.- Hacking the PS4, part 1 – cturt.github.io
- Hacking the PS4, part 2 – cturt.github.io
- Hacking the PS4, part 3 – cturt.github.ioc
Vulnerabilities
- Back to 28: Grub2 Authentication 0-Day – hmarco.org
Grub2 is the bootloader used by most Linux systems including some embedded systems. This results in an incalculable number of affected devices.
- BadWinmail Microsoft Outlook Bug Can Give Attackers Control Over PCs – news.softpedia.com
Just by looking at an email message in Outlook, attackers can now take control over your PC. The good news is that Microsoft has patched the issue, but unless you updated Outlook after December 8, you’re still vulnerable to this issue.
Leave A Comment