๐ Recent Supply Chain Cyberattacks and lessons learnt from that
๐ https://hacklido.com/blog/851-recent-supply-chain-cyberattacks-and-lessons-learnt-from-that
๐ https://hacklido.com/blog/851-recent-supply-chain-cyberattacks-and-lessons-learnt-from-that
HACKLIDO
Recent Supply Chain Cyberattacks and lessons learnt from that
Understanding Supply Chain Cyberattacks A supply chain cyberattack targets third-party vendors within an organizationโs supply chain. Historically, these a...
๐ How to Respond to Incident or Attacks & How not to screw up the crime scene
๐ https://hacklido.com/blog/852-how-to-respond-to-incident-or-attacks-how-not-to-screw-up-the-crime-scene
๐ https://hacklido.com/blog/852-how-to-respond-to-incident-or-attacks-how-not-to-screw-up-the-crime-scene
HACKLIDO
How to Respond to Incident or Attacks & How not to screw up the crime scene
โIf you canโt decipher our data, then why are you here?โ This is a common reaction when our team arrives. Now, let me explain everything while covering:...
๐ Reverse engineering of natively compiled .NET applications
๐ https://hacklido.com/blog/855-reverse-engineering-of-natively-compiled-net-applications
๐ https://hacklido.com/blog/855-reverse-engineering-of-natively-compiled-net-applications
HACKLIDO
Reverse engineering of natively compiled .NET applications
Explore the internals of applications built using native ahead-of-time (AOT) compilation. The .NET 7 platform debuted a new deployment model: forward nati...
๐ Introduction to Secure Software Development Lifecycle (SSDLC)
๐ https://hacklido.com/blog/861-introduction-to-secure-software-development-lifecycle-ssdlc
๐ https://hacklido.com/blog/861-introduction-to-secure-software-development-lifecycle-ssdlc
HACKLIDO
Introduction to Secure Software Development Lifecycle (SSDLC)
Security should be integrated into every stage of the software development lifecycle. Description The traditional Software Development Lifecycle (SDLC) foll...
๐ Pentesting Active Directory - Complete Guide | Part 1
๐ https://hacklido.com/blog/862-pentesting-active-directory-complete-guide-part-1
๐ https://hacklido.com/blog/862-pentesting-active-directory-complete-guide-part-1
HACKLIDO
Pentesting Active Directory - Part 1 | Trees, Forest and Trust Relations
Let me introduce you to Active directory and familiarize with itโs components like trees, forest and trust relations Introduction Active Directory (AD) i...
๐ CVE-2021-40444 - RCE in Microsoft's MSHTML browser rendering engine | MerkSpy
๐ https://hacklido.com/blog/869-cve-2021-40444-rce-in-microsofts-mshtml-browser-rendering-engine-merkspy
๐ https://hacklido.com/blog/869-cve-2021-40444-rce-in-microsofts-mshtml-browser-rendering-engine-merkspy
HACKLIDO
CVE-2021-40444 - RCE in Microsoft's MSHTML browser rendering engine | MerkSpy
FortiGuard Labs detected an attack exploiting the CVE-2021-40444 vulnerability in Microsoft Office, which allows attackers to execute malicious code via sp...
๐ Pentesting Active Directory - Complete Guide | Part 2
๐ https://hacklido.com/blog/863-pentesting-active-directory-complete-guide-part-2
๐ https://hacklido.com/blog/863-pentesting-active-directory-complete-guide-part-2
HACKLIDO
Pentesting Active Directory - Part 2 | Access Control, Users, KRGBT, Golden ticket attack
Letโs learn about Authentication, Authorization, Access Control, Users, KRGBT, Golden ticket attack and more. Active Directory (AD) authentication is a W...
๐ Pentesting Active Directory - Complete Guide | Part 3
๐ https://hacklido.com/blog/864-pentesting-active-directory-complete-guide-part-3
๐ https://hacklido.com/blog/864-pentesting-active-directory-complete-guide-part-3
HACKLIDO
Pentesting Active Directory - Part 3 | Recon with AD Module, Bloodhound, PowerView & Adalanche
Letโs learn about generic reconnaissance & Enumeration in AD - Using AD Module, Bloodhound, PowerView & Adalanche The process of finding a Domai...
๐ Pentesting Active Directory - Complete Guide | Part 4
๐ https://hacklido.com/blog/865-pentesting-active-directory-complete-guide-part-4
๐ https://hacklido.com/blog/865-pentesting-active-directory-complete-guide-part-4
HACKLIDO
Pentesting Active Directory - Part 4 | LLMNR Poisoning
Letโs learn about broadcast poisoning in AD - LLMNR Poisoning Or Link-Local Multicast Name Resolution Poisoning is an attack technique commonly used duri...
Hello ๐ Hackers!
From the beginning, our vision has always been to create a open platform where anyone can start infosec blogging and soon start making $$, while maintaining access to knowledge open (free) for all readers.
We're excited to announce that very soon, we'll be rolling out an ad revenue split of up to 60% for the writers! This is our way to incentivize the bloggers on the platform (present + future ones).
So, If you've ever thought about sharing your insights and expertise, now is the perfect time to start blogging at Hacklido. This will help you to capture the moment when our new revenue split rolls out ๐
Stay tuned for more updates. Your support means the world to us. โค๏ธ Keep writing, keep sharing, and let's make this journey even more amazing!
Cheers,
The Hacklido Team
From the beginning, our vision has always been to create a open platform where anyone can start infosec blogging and soon start making $$, while maintaining access to knowledge open (free) for all readers.
We're excited to announce that very soon, we'll be rolling out an ad revenue split of up to 60% for the writers! This is our way to incentivize the bloggers on the platform (present + future ones).
So, If you've ever thought about sharing your insights and expertise, now is the perfect time to start blogging at Hacklido. This will help you to capture the moment when our new revenue split rolls out ๐
Stay tuned for more updates. Your support means the world to us. โค๏ธ Keep writing, keep sharing, and let's make this journey even more amazing!
Cheers,
The Hacklido Team
๐ Pentesting Active Directory - Complete Guide | Part 5
๐ https://hacklido.com/blog/866-pentesting-active-directory-complete-guide-part-5
๐ https://hacklido.com/blog/866-pentesting-active-directory-complete-guide-part-5
HACKLIDO
Pentesting Active Directory - Part 5 | Lateral Movement, Privilege Escalation & Tools
Letโs learn about Lateral movement, privilege escalation and some amazing tools that you can add to your arsenal Introduction Once inside the network, t...
๐ Stealthy Exploit Opens Door for Pre-Compilation Code Execution - Autoconf
๐ https://hacklido.com/blog/871-stealthy-exploit-opens-door-for-pre-compilation-code-execution-autoconf
๐ https://hacklido.com/blog/871-stealthy-exploit-opens-door-for-pre-compilation-code-execution-autoconf
HACKLIDO
Stealthy Exploit Opens Door for Pre-Compilation Code Execution - Autoconf
Introduction Linux users often take pride in their ability to compile their own code. In spite of this, a subtle yet critical attack vector has existed fo...
๐ Pentesting Active Directory - Complete Guide @hacklido
ยป #1 - Active directory and familiarize with itโs components like trees, forest and trust relations
ยป #2 - Authentication, Authorization, Access Control, Users, KRGBT, Golden ticket attack and more
ยป #3 - reconnaissance & Enumeration in AD - Using AD Module, Bloodhound, PowerView & Adalanche
ยป #4 - LLMNR Poisoning
ยป #5 - Lateral movement, privilege escalation and some amazing tools that you can add to your arsenal
ยป #6 - Domain persistence and cross forest attacks
๐ Link to collection: https://hacklido.com/lists/6
More from the writer is on it's way ยปยป Anyone can write@hacklido , start writing to monetize and promote all your infosec blogs!
ยป #1 - Active directory and familiarize with itโs components like trees, forest and trust relations
ยป #2 - Authentication, Authorization, Access Control, Users, KRGBT, Golden ticket attack and more
ยป #3 - reconnaissance & Enumeration in AD - Using AD Module, Bloodhound, PowerView & Adalanche
ยป #4 - LLMNR Poisoning
ยป #5 - Lateral movement, privilege escalation and some amazing tools that you can add to your arsenal
ยป #6 - Domain persistence and cross forest attacks
๐ Link to collection: https://hacklido.com/lists/6
More from the writer is on it's way ยปยป Anyone can write
๐ Getting started with Snort IPS - A QuickStart Guide
๐ https://hacklido.com/blog/873-getting-started-with-snort-ips-a-quickstart-guide
๐ https://hacklido.com/blog/873-getting-started-with-snort-ips-a-quickstart-guide
HACKLIDO
Getting started with Snort IPS - A QuickStart Guide
Introduction Snort is an open source Intrusion Prevention System (IPS) that detects malicious network traffic by comparing the network packets to a set of...
๐ Windows Remoting: Difference between psexec, wmiexec, atexec, *exec
๐ https://hacklido.com/blog/872-windows-remoting-difference-between-psexec-wmiexec-atexec-exec
๐ https://hacklido.com/blog/872-windows-remoting-difference-between-psexec-wmiexec-atexec-exec
HACKLIDO
Windows Remoting: Difference between psexec, wmiexec, atexec, *exec
If youโre anything like me, you discovered Impacket, either through a course, Ippsec, or your own research, and you look at the scripts. Your grin turns...
โ๏ธ CyberWeekly 13' July | Issue #5
โ๏ธ Evernote RCE, Windows Remoting, CVE-2021-40444, MSHTML, Pentesting AD, Reverse engineering .NET, WGU, Global AppSec 2024 Lisbon, Universal RCE, False File Immutability, EvilnoVNC, STOK, Polyfill(.)io
๐ https://hacklido.substack.com/p/cyberweekly-13-july-issue-5
โ๏ธ Evernote RCE, Windows Remoting, CVE-2021-40444, MSHTML, Pentesting AD, Reverse engineering .NET, WGU, Global AppSec 2024 Lisbon, Universal RCE, False File Immutability, EvilnoVNC, STOK, Polyfill(.)io
๐ https://hacklido.substack.com/p/cyberweekly-13-july-issue-5
๐ Key Ransomeware Threats In 2024
๐ https://hacklido.com/blog/877-key-ransomeware-threats-in-2024
๐ https://hacklido.com/blog/877-key-ransomeware-threats-in-2024
HACKLIDO
Key Ransomeware Threats In 2024
In June, we wrote about Akira โ a ransomware group using double extortion techniques to coerce victims after stealing and encrypting their sensitive data....
๐ Pentesting Active Directory - Part 7 | Abusing Misconfigured Templates (ESC1)
๐ https://hacklido.com/blog/882-pentesting-active-directory-part-7-abusing-misconfigured-templates-esc1
๐ https://hacklido.com/blog/882-pentesting-active-directory-part-7-abusing-misconfigured-templates-esc1
HACKLIDO
Pentesting Active Directory - Part 7 | Abusing Misconfigured Templates (ESC1)
Active Directory Certificate Services ADCS is used for managing public key infrastructure in an Active Directory environment. Itโs commonly used in enter...
๐ The Rise Of Ransomeware As A Service
๐ https://hacklido.com/blog/879-the-rise-of-ransomeware-as-a-service
๐ https://hacklido.com/blog/879-the-rise-of-ransomeware-as-a-service
HACKLIDO
The Rise Of Ransomeware As A Service
Ransomware as a Service (RaaS) platforms continue to emerge, causing a significant impact across industries and organisations. Theyโre enabling inexperien...
๐ Why You Should Implement Post-Quantum Security Now
๐ https://hacklido.com/blog/878-why-you-should-implement-post-quantum-security-now
๐ https://hacklido.com/blog/878-why-you-should-implement-post-quantum-security-now
HACKLIDO
Why You Should Implement Post-Quantum Security Now
For years, quantum computing has been a vision of the future. Itโs a technology that has been far away โ a distant promise of computing power far beyond ou...