Ahmed AlgoharyIn-Depth Malware Analysis of Nova Stealer v12.5:So, one of my friends got a job offer on one of the freelance websites, the job offeror sent him a file as a work-related file an exe file…Jul 13Jul 13
Ahmed AlgoharyDownload any PDF from slideshare.net for freeNot an appealing sight right, lets “hack” it.Mar 17Mar 17
Ahmed AlgoharyFoothold using MACROSOne of the most popular ways red team uses to gain a foothold on a windows machine is through sending a document file contains a malicious…Nov 18, 2023Nov 18, 2023
Ahmed AlgoharyGetting User’s NTLMv2 hash through LLMNR/NBT-NS PoisoningI will walk you through step-by-step guide to get user’s NTLMv2 hash using LLMNR/NBT-NS Poisoning and cracking it using John the Ripper.Jan 22, 2023Jan 22, 2023
Ahmed AlgoharyPersistence on a windows machine using “winrm” (no creds needed)Step 1:Oct 18, 2022Oct 18, 2022