Obsidian. An unconventional attack surface
Using Obsidian plugins to keylog users, drop files to disk, or execute arbitrary code.
Active Directory. An overview
To learn more about Active Directory to improve my netsec skills for engagements and for OSCP/CRT prep I started accumulating notes in my own words about how each section of Active Directory works.
Detecting AMSI bypass techniques
Detecting AMSI bypassing techniques with Machine Learning
Juicy Potato and how to exploit it
The
SE IMPERSONATE
privilege is a great one to see. This post talks through one of the potato exploits (they are all similar-ish) and highlights some possible ways to get a shell back as i have found it to be awkward at times.
SEH Overflows
What is a SEH? When and where are they used in Windows environments? How are they exploited? All things covered in this post about SEH Overflows.
Useful Docker commands & exploring Docker sockets
This post talks about Docker sockets and all the ways we can interact with a Docker socket as well as techniques used to escape docker containers through exposed Docker sockets.