what the MODBUS; or — attacking SCADAImagine one day you wake up from a call, it is a city major and he has a very special job for you. Somebody has to be responsible for…Jan 17Jan 17
LAPS enumerationLAPS protocol is a Microsoft security feature designed to manage and secure local administrator passwords across Windows systems. It…Nov 28, 2024Nov 28, 2024
LDAP injectionLDAP Injection is one of the less known, but crucial logic flaw attacks, its similar in principle to SQL Injection, but it is targeting…Nov 9, 20241Nov 9, 20241
SOCKS Proxy (SSH forwarding part 2)Dynamic port forwarding is a powerful feature of SSH that allows you to create a SOCKS proxy on your machine. This proxy can be used to…Sep 12, 2024Sep 12, 2024
“How am I supposed to drive there without GPS??!”As a fellow suffering citizen of north Israel (you will understand why in a minute), I feel like it’s my duty to deep into the problem that…Sep 12, 2024Sep 12, 2024
Is It Really an SSH connection, or…???“Well, the traffic seems legit, it’s just some ssh connections, whatever” — probably said somebody. But what if it’s not always so…Sep 12, 2024Sep 12, 2024
Weaponizing HTAHTA or HTML application is a dynamic HTML , basically the same as a regular HTML page, except that it is run using mshta.exe and supports…Aug 8, 20241Aug 8, 20241
OAuth real quickWhenever a user is signing into a new website, he’s providing information, creating a nickname and a password, but is it always the…Aug 3, 2024Aug 3, 2024
EtterFILTER & EtterCapIn the world of github and google there is a plenty of different tools that can help you perform MITM attack or intercept network traffic…Aug 3, 2024Aug 3, 2024