MITRE ATT&CK⢠Analysis - T1056.004 Credential API Hooking
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Various tests involving methods outlined within the MITRE ATT&CK framework.
Hacking âPwn Adventure 3: Pwnie Islandâ, an intentionally vulnerable first-person MMORPG.
Analysis of Remcos RAT, a prevalent remote access tool/trojan.
Analysis of a web shell Iâve named Aspmuma 2009 âxxooxxâ.
Analysis of the malware Redline Stealer.
Analysis of the malware STRRAT.
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
Hacking âPwn Adventure 3: Pwnie Islandâ, an intentionally vulnerable first-person MMORPG.
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In December 2022, I successfully c...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In December 2021, I successfully c...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In December 2020, I successfully c...
The Unofficial Defcon DFIR CTF comprised of 5 different challenge categories with a total of 82 DFIR related challenges including a Crypto Challenge, Deadbox...
Querier is true to its name, requiring exploitation of common SQL vulnerabilities whilst combining elements of combing through macros, insecure SMB shares, h...
Bastion was a relatively simple machine with the biggest issue steming from maintaining a connection to a remote mounted drive. Utilising a machine vhd backu...
Netmon was a very simple box which highlighted issues with open FTP servers, plaintext configuration files, common password conventions, and blindly trusting...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In January 2019, I successfully co...
This machine highlighted a few issues such as supply chain compromise, the ease of hiding information using steganography, and how easily a vulnerable binary...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In December 2019, I successfully c...
This machine was quite interesting, and contained a privilege escalation method Iâd not seen mentioned elsewhere. Luckily this was confined to the challenge,...
This machine was interesting, starting with directory traversal and LFI vulnerabilities, it then exploits a feature not commonly known which is supposed to b...
This machine took a bit of thinking outside of the box so it was a bit of a nice challenge and involved exploiting both custom binaries and legitimate servic...
This machine had some interesting elements to it and really made you think outside of the box. It incorporated a number of elements which you wouldnât typica...
This machine had some CTF elements to it, but overall wasnât that difficult to complete through proper enumeration. It highlights some issues which may be pr...
Help was an interesting machine which appeared to have multiple ways of gaining access and elevating privileges. In the end it contained elements of graphql,...
This machine was fairly straight forward and mimicked something youâd unfortunately expect to see even today in a typical penetration test. All in all itâs a...
This machine was fairly basic but still provided some useful reminders and tools which can be utilised to export pst file contents on Linux, natively transfe...
Jerry would have to be one of the easiest machines Iâve ever compromised on Hack The Box. This involved using legitimate credentials to log onto an Apache To...
Dev0ops highlighted issues with weakly configured XML parsers which lead to an XXE vulnerability, and developer error which lead to SSH keys in commit revisi...
This machine contained a fairly straightforward SMTP vulnerability which didnât even need to be exploited to fully compromise the machine. It is an essential...
Chatterbox was a reasonably simple machine which required exploiting a vulnerable âAchatâ service with custom shellcode, and then migrating to a more stable ...
Jeeves showed us that an unauthenticated Jenkins server can easily lead to a reverse shell through Groovy Script even if the web-directory is unknown. It hig...
Bashed was an extremely simple box demonstrating some of the most basic techniques for spawning reverse shells and elevating privileges. It is a great beginn...
Blue is definitely one of the shortest boxes in Hack The Box history. As the name suggests all that was required to fully compromise this machine was MS17-01...
Analysis of Remcos RAT, a prevalent remote access tool/trojan.
Analysis of a web shell Iâve named Aspmuma 2009 âxxooxxâ.
Analysis of the malware Redline Stealer.
Analysis of the malware STRRAT.
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
This details reverse engineering activities and answers for labs contained in the book âPractical Malware Analysisâ by Michael Sikorski and Andrew Honig, whi...
Querier is true to its name, requiring exploitation of common SQL vulnerabilities whilst combining elements of combing through macros, insecure SMB shares, h...
Bastion was a relatively simple machine with the biggest issue steming from maintaining a connection to a remote mounted drive. Utilising a machine vhd backu...
Netmon was a very simple box which highlighted issues with open FTP servers, plaintext configuration files, common password conventions, and blindly trusting...
This machine highlighted a few issues such as supply chain compromise, the ease of hiding information using steganography, and how easily a vulnerable binary...
This machine was quite interesting, and contained a privilege escalation method Iâd not seen mentioned elsewhere. Luckily this was confined to the challenge,...
This machine was interesting, starting with directory traversal and LFI vulnerabilities, it then exploits a feature not commonly known which is supposed to b...
This machine took a bit of thinking outside of the box so it was a bit of a nice challenge and involved exploiting both custom binaries and legitimate servic...
This machine had some interesting elements to it and really made you think outside of the box. It incorporated a number of elements which you wouldnât typica...
This machine had some CTF elements to it, but overall wasnât that difficult to complete through proper enumeration. It highlights some issues which may be pr...
Help was an interesting machine which appeared to have multiple ways of gaining access and elevating privileges. In the end it contained elements of graphql,...
This machine was fairly straight forward and mimicked something youâd unfortunately expect to see even today in a typical penetration test. All in all itâs a...
This machine was fairly basic but still provided some useful reminders and tools which can be utilised to export pst file contents on Linux, natively transfe...
Jerry would have to be one of the easiest machines Iâve ever compromised on Hack The Box. This involved using legitimate credentials to log onto an Apache To...
Dev0ops highlighted issues with weakly configured XML parsers which lead to an XXE vulnerability, and developer error which lead to SSH keys in commit revisi...
This machine contained a fairly straightforward SMTP vulnerability which didnât even need to be exploited to fully compromise the machine. It is an essential...
Chatterbox was a reasonably simple machine which required exploiting a vulnerable âAchatâ service with custom shellcode, and then migrating to a more stable ...
Jeeves showed us that an unauthenticated Jenkins server can easily lead to a reverse shell through Groovy Script even if the web-directory is unknown. It hig...
Bashed was an extremely simple box demonstrating some of the most basic techniques for spawning reverse shells and elevating privileges. It is a great beginn...
Blue is definitely one of the shortest boxes in Hack The Box history. As the name suggests all that was required to fully compromise this machine was MS17-01...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In December 2022, I successfully c...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In December 2021, I successfully c...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In December 2020, I successfully c...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In January 2019, I successfully co...
Every year the SANS Institute and the Counter Hack Team hosts a âHoliday Hack Challengeâ also commonly referred to as HHC. In December 2019, I successfully c...
Cyber Security resources for OSCP and penetration testing.
Querier is true to its name, requiring exploitation of common SQL vulnerabilities whilst combining elements of combing through macros, insecure SMB shares, h...
Cheatsheet containing a variety of commands and concepts relating to digital forensics and incident response.
The Unofficial Defcon DFIR CTF comprised of 5 different challenge categories with a total of 82 DFIR related challenges including a Crypto Challenge, Deadbox...
Cheatsheet containing a variety of commands and concepts relating to digital forensics and incident response.
Cyber Security resources for OSCP and penetration testing.
The Unofficial Defcon DFIR CTF comprised of 5 different challenge categories with a total of 82 DFIR related challenges including a Crypto Challenge, Deadbox...
Cyber Security resources for OSCP and penetration testing.
Analysis of the malware STRRAT.
Analysis of the malware STRRAT.
Analysis of the malware Redline Stealer.
Place to capture random social media posts which Iâve made, and capture various pieces of shared knowledge which proved popular.
Analysis of a web shell Iâve named Aspmuma 2009 âxxooxxâ.
Analysis of Remcos RAT, a prevalent remote access tool/trojan.
Hacking âPwn Adventure 3: Pwnie Islandâ, an intentionally vulnerable first-person MMORPG.
Hacking âPwn Adventure 3: Pwnie Islandâ, an intentionally vulnerable first-person MMORPG.