Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as demonstrated by a new red team post-exploitation framework named "Specula," released today by cybersecurity firm ...
Ridge Security Automated Penetration Testing Solution Delivers Advanced Post-Exploitation Techniques
SANTA CLARA, Calif.--(BUSINESS WIRE)--Ridge Security, cutting-edge automated pen-testing solution provider, announces new capabilities in RidgeBot 3.4, for post-exploitation validation. This new ...
Instead of relying on premade and well-known toolkits, the threat actors behind the TrickBot trojan decided to develop a private post-exploitation toolkit called PowerTrick to spread malware laterally ...
A legitimate open-source server monitoring tool has been repurposed by attackers to gain full remote control of compromised systems. According to new findings from Ontinue’s Cyber Defense Center, the ...
The post-exploitation tools market has chalked up a newcomer with the emergence of Exfiltrator-22. An upstart alternative to Cobalt Strike, the Exfiltrator-22 framework-as-a-service (FaaS) tool set, ...
Metasploit tutorial part 1: Inside the Metasploit framework Metasploit tutorial part 2: Using meterpreter Metasploit guide 4: Armitage cyber attack management GUI Social Engineer Toolkit (SET) ...
Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets. Other useful attacks it enables are pass-the-hash, pass-the-ticket or ...
The explosive, easy-to-trigger vulnerability was exploited within hours of disclosure, exposing the risks of default ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results