If you have compromised a Windows host and are unable or unwilling to dump public passwords using traditional methods (such as sekurlsa::logonpasswords from mimikatz or LSASS dump), you should check your credential delegation settings. If enabled, it allows you to …
DSAS INJECT [BLOG] Articles.
the system boot process Introduction Bruter is a distributed password brute force system for VNC right from home via a TOR+VPN bundle on a virtual machine farm with support for backups, notification to a smartphone via the “pushed” application and …
Let’s talk a little about DRAINERs, for sure you have met a lot of DRAINERs on the Internet. Now the dark market is filled with many different DRAINERS that are indistinguishable from real crypto projects. Drivers such as Inferno / …
Stealer written in powershell.- Collecting passwords of Firefox based and Chromium based browsers- Stiller itself is almost entirely written in powershell. The exception is the DLL that will be injected into the chrome process to unlock cookies. About the unlock …
What exactly is Netstat?In short, Netstat is a utility that is used to display a list of active connections on a computer. Why did I choose Netstat?1) We can control the output of Netstat2) Regardless of the privilege level, you …
Cobalt strike is a powerful exploitation and post-exploitation framework used in penetration testing and hacker attack emulation. This tool has features such as: Hosts are infected using so-called beacons, but out of the box Cobalt allows you to generate loads …
–> we use a x86 processor for this articlesorry apple M1/M2((( –> use qemu**donot compile the code with optimizations flags Speculative execution (can skip for now) It is basic enhacement inside modern CPUs to improve performance by predicting future outcomes of …
Dear all good day! I would like to share with you some thoughts on a project that I am currently working, that is about DLL Injection on Windows 10 and Windows 11. But first, please allow me to note that …