PowerShell Language Modes-Part 2

PowerShell Language Modes-Part 2

Part 1 of this series examined the basics of the PowerShell Language modes, their types and the Constrained Language Mode. It also reviewed the Device Guard and Code Integrity (UMCI & KMCI). In... Go on to the site to read the full article ... Read More
Top Five Open Source Intelligence (OSINT) Tools

Top Five Open Source Intelligence (OSINT) Tools

In this article, we will look at top five Open Source Intelligence tools. Before we jump directly on tools, it is essential to understand what is Open Source Intelligence(OSINT) and how it can... Go on to the site to read the full article ... Read More
PowerShell Language Modes-Part 1

PowerShell Language Modes-Part 1

In this article, we will discuss various PowerShell language modes. In Part 1 we will look at all the basics around PowerShell language and its various types. In Part 2 we will look at some of the... Go on to the site to read the full article ... Read More
Necurs: World’s Largest Botnet

Necurs: World’s Largest Botnet

This article examines what is touted to be the world’s largest botnet known as “Necurs,” focusing on the following: How Necurs stands out from other botnets; The famous... Go on to the site to read the full article ... Read More
User Account Control(UAC) Bypass Techniques-Part 2

User Account Control(UAC) Bypass Techniques-Part 2

In continuation to Part-1 where we discussed basics around UAC, auto-elevate, etc., in this article, we will take a look at the techniques which uses the features described in Part-1. It is advised... Go on to the site to read the full article ... Read More
User Account Control(UAC) Bypass Techniques-Part 1

User Account Control(UAC) Bypass Techniques-Part 1

In this article series, we will look at the UAC feature and learn/refresh about famous UAC bypass techniques. Although there are many techniques that have been discovered by the researchers in the... Go on to the site to read the full article ... Read More
The Five Largest Ransomware Attacks of 2017

The Five Largest Ransomware Attacks of 2017

The Year 2017 had a lot of sleepless nights for the security professional, IT admins, etc. as huge cyber-attacks marred it. Targets of those cyber-attacks were not some selected individuals but whole... Go on to the site to read the full article ... Read More
Process Doppelgänging

Process Doppelgänging

In this article, a new injection technique which is named as “Process Doppelgänging,” is reviewed. This technique was unveiled in at the Black Hat Europe by two security researchers from... Go on to the site to read the full article ... Read More
Amazon S3 Buckets-Hardening

Amazon S3 Buckets-Hardening

/ / Hacking
Cloud computing is the latest trend these days, and most businesses and corporations have either fully transitioned their IT Infrastructure to the cloud or are in the process of achieving this task.... Go on to the site to read the full article ... Read More