A few days ago I participated with a colleague in a Red Teaming exercise. I’m just starting out in this kind of exercise (I hope…
Posts published in “Postexplotation”
A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in all major Linux distributions and in some Unix-like operating systems, has just appeared and…
This is the third post on the post-exploitation method based on code caves. In the first part I showed you how to create a basic…
This is the second part of the set of posts about Post Explotation Backdooring. If you haven’t read the previous post, I recommend you do…
A few months ago I was in a post-exploitation course taught by my ex colleagueOscarAkaElvis (creator of the tool to audit Airgeddon, which I recommend…
Recently I am doing some very interesting Pentester Academy courses. Thanks to them I am learning a lot, since they deal with very particular topics…