DLL Proxying

MalRDP: Implementing Rouge RDP Manually

Weaponizing RDP files for phishing and initial access. Based on the work of Mike Felch on Rouge RDP technique.

It’s all in the details: The curious case of an LSASS dumper gone undetected

Let me first start by saying I will not be revealing in this post any novel techniques or new research that hasn’t been seen before. I will, however, reveal my own methodology when it comes to finding gaps in EDRs visibility in order to bypass detection.

Get informed of the latest news in cyber security

Enter your email address to receive cyber security tips, techniques, and updates

powered by nextbracket.io