Obsidian. An unconventional attack surface

Obsidian. An unconventional attack surface
Using Obsidian plugins to keylog users, drop files to disk, or execute arbitrary code.
Read more →

Active Directory. An overview

Active Directory. An overview
To learn more about Active Directory to improve my netsec skills for engagements and for OSCP/CRT prep I started accumulating notes in my own words about how each section of Active Directory works.
Read more →

Detecting AMSI bypass techniques

Detecting AMSI bypass techniques
Detecting AMSI bypassing techniques with Machine Learning
Read more →

Docker escapes

Docker escapes
This post is just a handbook of docker escapes
Read more →

Juicy Potato and how to exploit it

Juicy Potato and how to exploit it
The SE IMPERSONATE privilege is a great one to see. This post talks through one of the potato exploits (they are all similar-ish) and highlights some possible ways to get a shell back as i have found it to be awkward at times.
Read more →

SEH Overflows

SEH Overflows
What is a SEH? When and where are they used in Windows environments? How are they exploited? All things covered in this post about SEH Overflows.
Read more →

Useful Docker commands & exploring Docker sockets

Useful Docker commands & exploring Docker sockets
This post talks about Docker sockets and all the ways we can interact with a Docker socket as well as techniques used to escape docker containers through exposed Docker sockets.
Read more →