Why Hunting For LOLBINs Is One Of The Best Bets by Nasreddine Bencherchali Introduction While working on “Malicious Command-Line”(MAL-CL), documenting and researching the many use cases different tools can be (ab)used via the command line. I noticed a trend that in hindsight seems “obviously obvious” but is I believe worth....
Read the rest of this story with a free account.
Already have an account? Sign in
- OfficialFebruary 22, 2023Windows Privilege Escalation: The Concepts of Hijacking Execution Flow
- OfficialFebruary 22, 2023Building Intuition into Monitoring for OT/ICS Security
- OfficialFebruary 22, 2023WiFi Pentesting with Airodump-ng
- OfficialFebruary 21, 2023ETW vs Sysmon Against C2 Servers