A.R.RahimWindows Core ProcessUnderstanding windows core processes is essential if you are a security guy dealing with Windows products. There is a famous saying that…Nov 12, 2022Nov 12, 2022
A.R.RahiminBlock MagnatesHow Security Works On WindowsThis article aims to understand the basics of the security process in windows and how windows manage access to ensure secured access to the…May 15, 2022May 15, 2022
A.R.RahiminSystem WeaknessWindows Privilege Escalation: Unquoted Service PathsUnquoted Service PathsApr 28, 2022Apr 28, 2022
A.R.RahiminSystem WeaknessWindows Privilege Escalation: Hijacking DLLsHijacking DLLsApr 9, 2022Apr 9, 2022
A.R.RahiminSystem WeaknessWindows Privilege Escalation: Weak Service PermissionsAdversaries can hijack binaries/executables used by windows services with their malicious payload if the permissions on the services are…Mar 17, 2022Mar 17, 2022
A.R.RahiminSystem WeaknessWindows Privilege Escalation: Weak Registry PermissionsWeak Registry PermissionsMar 12, 2022Mar 12, 2022
A.R.RahimWindows Privilege Escalation: AlwaysInstallElevatedAlwaysInstallElevatedMar 4, 2022Mar 4, 2022
A.R.RahimWindows Privilege Escalation: AutoRunPrivilege escalation is a post-exploitation technique that is used to gain higher privileges on the system. Threat actors exploit software…Mar 2, 2022Mar 2, 2022