If you have compromised a Windows host and are unable or unwilling to dump public passwords using traditional methods (such as sekurlsa::logonpasswords from mimikatz or LSASS dump), you should check your credential delegation settings. If enabled, it allows you to …
DSAS INJECT [BLOG] Articles.
the system boot process Introduction Bruter is a distributed password brute force system for VNC right from home via a TOR+VPN bundle on a virtual machine farm with support for backups, notification to a smartphone via the “pushed” application and …
Let’s talk a little about DRAINERs, for sure you have met a lot of DRAINERs on the Internet. Now the dark market is filled with many different DRAINERS that are indistinguishable from real crypto projects. Drivers such as Inferno / …
Stealer written in powershell.- Collecting passwords of Firefox based and Chromium based browsers- Stiller itself is almost entirely written in powershell. The exception is the DLL that will be injected into the chrome process to unlock cookies. About the unlock …
What exactly is Netstat?In short, Netstat is a utility that is used to display a list of active connections on a computer. Why did I choose Netstat?1) We can control the output of Netstat2) Regardless of the privilege level, you …
Cobalt strike is a powerful exploitation and post-exploitation framework used in penetration testing and hacker attack emulation. This tool has features such as: Hosts are infected using so-called beacons, but out of the box Cobalt allows you to generate loads …
In this article I will simply insert code snippets that will help you write your own loader without any problems. How will it work? You launch your loader/dropper, it does not disable Windows Defender, because a corresponding notification will appear, …
With the advent of managed computing systems and the attack on information systems, the question suddenly arose with the operational chains on the basis in which any information system in the company operates. The data includes accessories/connects new classes of …
–> we use a x86 processor for this articlesorry apple M1/M2((( –> use qemu**donot compile the code with optimizations flags Speculative execution (can skip for now) It is basic enhacement inside modern CPUs to improve performance by predicting future outcomes of …
Dear all good day! I would like to share with you some thoughts on a project that I am currently working, that is about DLL Injection on Windows 10 and Windows 11. But first, please allow me to note that …