- Présentations
- Documents
- Infographies
Hacking Microsoft Remote Desktop Services for Fun and Profit
Alisa Esage Шевченко
•
il y a 12 ans
ColdFusion for Penetration Testers
Chris Gates
•
il y a 11 ans
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
•
il y a 5 ans
Derbycon - The Unintended Risks of Trusting Active Directory
Will Schroeder
•
il y a 5 ans
Building an Empire with PowerShell
Will Schroeder
•
il y a 8 ans
I Have the Power(View)
Will Schroeder
•
il y a 8 ans
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Directory
DirkjanMollema
•
il y a 5 ans
Fundamentals of Linux Privilege Escalation
nullthreat
•
il y a 9 ans
Beyond xp_cmdshell: Owning the Empire through SQL Server
Scott Sutherland
•
il y a 6 ans
Extracting Credentials From Windows
NetSPI
•
il y a 9 ans
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
il y a 8 ans
NotaCon 2011 - Networking for Pentesters
Rob Fuller
•
il y a 10 ans
渗透测试思路技术与方法
挺
•
il y a 12 ans
Hadoop Security
Timothy Spann
•
il y a 8 ans
How MITRE ATT&CK helps security operations
Sergey Soldatov
•
il y a 5 ans
Mongo db eng
Михаил Фирстов
•
il y a 11 ans
Red Team Revenge - Attacking Microsoft ATA
Nikhil Mittal
•
il y a 6 ans
Continuous intrusion: Why CI tools are an attacker’s best friends
Nikhil Mittal
•
il y a 8 ans
Prepare Yourself to Become Infosec Professional
M.Syarifudin, ST, OSCP, OSWP
•
il y a 7 ans
Getting root with benign app store apps
Csaba Fitzl
•
il y a 5 ans