unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Hunting for Remote Management Tools
In today’s digital landscape, Remote Management and Monitoring (RMM) tools...
2024-7-18 19:58:55 | 阅读: 8 |
收藏
|
NVISO Labs - blog.nviso.eu
rmm
software
engagements
security
hunt
Punch Card Hacking – Exploring a Mainframe Attack Vector
Mainframes are the unseen workhorses that carry the load for many services we use on a daily bas...
2024-7-16 15:0:0 | 阅读: 7 |
收藏
|
NVISO Labs - blog.nviso.eu
jcl
jes
nviso
mainframe
security
The End of Passwords? Embrace the Future with Passkeys.
Yesterday, unexpectedly, my personal Google account suggested using Passkeys for login. This is...
2024-7-2 15:0:0 | 阅读: 15 |
收藏
|
NVISO Labs - blog.nviso.eu
passkeys
security
passwords
cloud
Format String Exploitation: A Hands-On Exploration for Linux
SummaryThis blogpost covers a Capture The Flag challenge that was part of the 2024 picoCTF e...
2024-5-23 19:0:0 | 阅读: 7 |
收藏
|
NVISO Labs - blog.nviso.eu
memory
setvbuf
payload
remote
gamers
Top things that you might not be doing (yet) in Entra Conditional Access – Advanced Edition
IntroductionIn the first post of the top things that you might not be doing (yet) in Entra C...
2024-3-18 16:0:0 | 阅读: 10 |
收藏
|
NVISO Labs - blog.nviso.eu
entra
microsoft
security
enforce
Unpacking Flutter hives
IntroWhen analyzing the security of mobile applications, it’s important to verify that all d...
2024-3-13 16:0:0 | 阅读: 13 |
收藏
|
NVISO Labs - blog.nviso.eu
dart
flutter
frames
ultimatebox
bee
Become Big Brother with Microsoft Purview
IntroductionWith the never-ending amount of data we generate, process, and share within and...
2024-3-6 16:0:0 | 阅读: 11 |
收藏
|
NVISO Labs - blog.nviso.eu
microsoft
purview
security
sensitivity
triangle
Covert TLS n-day backdoors: SparkCockpit & SparkTar
In early 2024, Ivanti’s Pulse Secure appliances suffered from wide-spread...
2024-3-1 18:59:0 | 阅读: 12 |
收藏
|
NVISO Labs - blog.nviso.eu
backdoors
network
nviso
sparktar
ivanti
Top things that you might not be doing (yet) in Entra Conditional Access
IntroductionIn this blog post, I focus on the top things that you might not be doing (yet) i...
2024-2-27 16:0:14 | 阅读: 14 |
收藏
|
NVISO Labs - blog.nviso.eu
entra
microsoft
security
identities
Is the Google search bar enough to hack Belgian companies?
In this blog post, we will go over a technique called Google Dorking and demonstrate how it can...
2024-1-22 16:0:0 | 阅读: 24 |
收藏
|
NVISO Labs - blog.nviso.eu
security
robots
attacker
belgium
Deobfuscating Android ARM64 strings with Ghidra: Emulating, Patching, and Automating
In a recent engagement I had to deal with some custom encrypted strings inside an Android ARM64...
2024-1-15 16:0:0 | 阅读: 31 |
收藏
|
NVISO Labs - blog.nviso.eu
ghidra
pcode
xorstring
decrypted
Scaling your threat hunting operations with CrowdStrike and PSFalcon
IntroductionMost modern day EDRs have some sort of feature which allows blue teamers to remo...
2023-12-13 16:0:0 | 阅读: 21 |
收藏
|
NVISO Labs - blog.nviso.eu
powershell
psfalcon
crowdstrike
groupid
RPC or Not, Here We Log: Preventing Exploitation and Abuse with RPC Firewall
Welcome, readers, to the first installment of our blog series “Preventing Exploitation and Abu...
2023-12-8 16:0:0 | 阅读: 22 |
收藏
|
NVISO Labs - blog.nviso.eu
windows
11d1
4b06
ab04
Data Connector Health Monitoring on Microsoft Sentinel
IntroductionSecurity information and event management (SIEM) tooling allows security teams t...
2023-12-6 16:0:0 | 阅读: 17 |
收藏
|
NVISO Labs - blog.nviso.eu
microsoft
monitoring
security
connectors
AI in Cybersecurity: Bridging the Gap Between Imagination and Reality
IntroductionIn today’s digital environment, we encounter a mix of evolving cyber systems and...
2023-11-8 16:0:0 | 阅读: 22 |
收藏
|
NVISO Labs - blog.nviso.eu
security
machine
analysis
threats
Generating IDA Type Information Libraries from Windows Type Libraries
When working with IDA, a commonly leveraged feature are type information libraries (TIL). These...
2023-11-7 16:0:0 | 阅读: 23 |
收藏
|
NVISO Labs - blog.nviso.eu
til
idaclang
mscorlib
library
maxime
Introducing CS2BR pt. III – Knees deep in Binary
IntroductionOver the span of the previous two blog posts in the series, I showed why the m...
2023-10-26 19:0:0 | 阅读: 21 |
收藏
|
NVISO Labs - blog.nviso.eu
cs2br
brc4
ty
scl
Most common Active Directory misconfigurations and default settings that put your organization at risk
IntroductionIn this blog post, we will go over the most recurring (and critical) findings th...
2023-10-26 15:0:0 | 阅读: 21 |
收藏
|
NVISO Labs - blog.nviso.eu
security
machine
attacker
encryption
spooler
XOR Known-Plaintext Attacks
In this blog post, we show in detail how a known-plaintext attack on XOR encoding works, and aut...
2023-10-12 15:0:0 | 阅读: 20 |
收藏
|
NVISO Labs - blog.nviso.eu
partial
ciphertext
kpa
nviso
keystream
A Beginner’s Guide to Adversary Emulation with Caldera
Target AudienceThe target audience for this blog post is individuals who have a basic und...
2023-8-25 15:0:0 | 阅读: 26 |
收藏
|
NVISO Labs - blog.nviso.eu
emulation
abilities
security
ttps
agents
Previous
1
2
3
4
5
6
7
8
Next