Nova Analysis
This blog details the steps taken in unravelling the stages associated with a Nova sample mentioned in my blog post on Compromising Threat Actor Communicatio...
This blog details the steps taken in unravelling the stages associated with a Nova sample mentioned in my blog post on Compromising Threat Actor Communicatio...
Traditionally, the vast majority of malware would communicate to a threat actor owned server via a threat actor owned domain or IP address. This domain or IP...
This is a ‘medium’ rated HTB Windows challenge featuring an interesting PE technqiue, Bring Your Own Vulnerable Driver (BYOVD).
This is a ‘easy’ rated HTB AD challenge in which we will be enumerating and attacking purely the DC. My offensive AD knowledge isn’t great so I apologise for...
This was a ‘easy’ rated Linux HTB machine with an interesting CVE initial access vector combined with a simple privilege escalation technique. Let’s begin.