Exfiltrating data outside the O365 secure Tenant, Outlook exampleBrief disclaimer before we get started: this post is purposely long to help anyone without prior experience dealing with data exfiltration…Mar 3, 2022Mar 3, 2022
Exfiltration series: abusing FirefoxIn this quick post, from an insider’s perspective on data exfiltration, we examine Firefox’s Sync Now feature. It syncs bookmarks, themes…Jul 24, 2021Jul 24, 2021
Organizing your very first internal security competitionLast week, I had the privilege of organizing our first internal security competition, and it was an incredibly rewarding experience! I…Feb 2, 2020Feb 2, 2020
Exfiltration series: Spotexfil“Data exfiltration occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer.” — WikipediaJun 7, 2019Jun 7, 2019
Abusing certificates for data exfiltration“Data exfiltration occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer.” — WikipediaMay 11, 2019May 11, 2019
First steps with Ghidra: crackme01Unless you have been sleeping under a rock lately, you may have heard about a new interesting tool released by the NSA: Ghidra. This…Apr 11, 2019Apr 11, 2019