Skip to content

MiTM as Service

A number of recent articles and posts around the rise of evil proxy have started to emerge. Evil Proxy is a service based offering allowing "anyone" (providing you pass the bad guy vetting process) access to a web based platform to launch and manage MiTM phishing campaigns. These phishing techniques are not new and have … Continue reading MiTM as Service →

tzar19 Uncategorized Leave a comment September 6, 2022September 6, 2022 3 Minutes

XLS 4.0 Macros and Covenant

XLS4.0 And Covenant

tzar19 Uncategorized Leave a comment October 24, 2020February 19, 2021 6 Minutes

HTB – Haystack Writeup

Haystack was a fun easy box over on HTB. Although perhaps only easy if you were at least aware of the tech stack being used on the machine. The initial path to user is perhaps not realistic but a fun mix of steg and research into elasticsearch in order to get credentials. This if then … Continue reading HTB – Haystack Writeup →

tzar19 Uncategorized Leave a comment November 25, 2019 4 Minutes

Netmon

So Netmon was a nice little box, not much digging was required for the first flag thats for sure. Nice little exploit of another network / sysadmin web application these seem to always be quite fun and straightforward as they are often designed to execute code on a server. Anyway on with the box! Kicks … Continue reading Netmon →

tzar19 Uncategorized Leave a comment July 3, 2019July 3, 2019 3 Minutes

Follow d-sec

  • Twitter

Get new content delivered directly to your inbox.

Join 19 other subscribers

RSS Threatpost Feed

  • Student Loan Breach Exposes 2.5M Records
    2.5 million people were affected, in a breach that could spell more trouble down the line.
  • Watering Hole Attacks Push ScanBox Keylogger
    Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
    Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
  • Ransomware Attacks are on the Rise
    Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
    Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Website Powered by WordPress.com.
  • Follow Following
    • d-sec.net
    • Already have a WordPress.com account? Log in now.
    • d-sec.net
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...