Open in app

Sign in

Write

Sign in

Lsec
Lsec

478 followers

Home

Lists

About

Pinned
System Weakness

Published in

System Weakness

Exploiting CVE-2022–26923 by Abusing Active Directory Certificate Services (ADCS)

CVE-2022–26923 is dangerous. There is large privilege escalation vector aiming directly at the domain’s administrative account(or machine)…

Jun 4, 2022
Exploiting CVE-2022–26923 by Abusing Active Directory Certificate Services (ADCS)
Exploiting CVE-2022–26923 by Abusing Active Directory Certificate Services (ADCS)
Jun 4, 2022

Utilizing Discord as C2 Traffic Broker

Introduction

Apr 30, 2024
Utilizing Discord as C2 Traffic Broker
Utilizing Discord as C2 Traffic Broker
Apr 30, 2024

Basic Process Injection with C

Introduction

Apr 25, 2024
3
Basic Process Injection with C
Basic Process Injection with C
Apr 25, 2024
3

Weaponizing DLL Hijacking via DLL Proxying

Sorry for not writing blogs for a while, but here am I now.

May 4, 2023
Weaponizing DLL Hijacking via DLL Proxying
Weaponizing DLL Hijacking via DLL Proxying
May 4, 2023

Attacking Active Directory: Unconstrained Delegation

The main focus of today’s topic will not be some C2 framework or AV bypass, but one specific AD attack.

Jan 15, 2023
Attacking Active Directory: Unconstrained Delegation
Attacking Active Directory: Unconstrained Delegation
Jan 15, 2023

Weaponizing Discord Shell via SMB

In the previous blog / video (https://medium.com/@lsecqt/using-discord-as-command-and-control-c2-with-python-and-nuitka-8fdced161fdd /…

Dec 4, 2022
Dec 4, 2022

Using Discord as Command and Control (C2) with Python and Nuitka

Hello fellow red teamers, I was thinking of a way to obfuscate C2 traffic and got myself an idea. Why not chain the traffic over some…

Dec 2, 2022
Using Discord as Command and Control (C2) with Python and Nuitka
Using Discord as Command and Control (C2) with Python and Nuitka
Dec 2, 2022

Developing SMB stager in Nim

Hello fellow Red Teamers. I recently started getting in touch with Nim for offensive coding. To be honest I find it difficult and strange…

Nov 24, 2022
Developing SMB stager in Nim
Developing SMB stager in Nim
Nov 24, 2022

Encrypting Shellcode with XOR | Offensive coding in C

Hello fellow red teamers. One of the techniques for AV evasion is encryption. While there are many, many encrypting algorightms, XOR is…

Nov 1, 2022
1
Encrypting Shellcode with XOR | Offensive coding in C
Encrypting Shellcode with XOR | Offensive coding in C
Nov 1, 2022
1

Creating Fully Undetectable Payload (FUD) with C

Welcome back my red teamers! Today’s blog is exciting because I personally did not expect such high result at evading AV vendors!

Oct 26, 2022
2
Creating Fully Undetectable Payload (FUD) with C
Creating Fully Undetectable Payload (FUD) with C
Oct 26, 2022
2
Lsec

Lsec

478 followers

OSCP / Ethical Hacker / Vulnerability Researcher / Youtuber https://www.youtube.com/c/Lsecqt

Following
  • Jaisabarish

    Jaisabarish

  • Tesla Motors

    Tesla Motors

  • HackerOne

    HackerOne

  • Symantec

    Symantec

See all (8)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech