Hello Rustaceans! Our technical director @raptor is back at it.
In this second installment of our #Rust series, “An offensive Rust encore”, he will guide you in bringing your skills to the next level by using a new PoC #RedTeaming tool as an excuse:
Hello Rustaceans! Our technical director @raptor is back at it.
In this second installment of our #Rust series, “An offensive Rust encore”, he will guide you in bringing your skills to the next level by using a new PoC #RedTeaming tool as an excuse:
Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain persistent access to compromised systems.
This page is a collection of topics I've studied and practiced during my transition from software engineering to offensive security, including my notes from a variety of certifications (such as OSCP, OSWA, and OSWP).
Mandiant has identified a novel method to bypass contemporary browser isolation technology and achieve command-and-control C2 operations.
@forst This was a very interesting problem thanks for sharing. You're right, it would be nice for technical users outside of an organization to sort of provide QA tickets/interface directly with some actual engineers. If you're a big enough "customer" you can get these tickets escalated.
I'm sure companies try to buffer those connections due to liabilities, social engineering, etc.
Don't forget, all the videos from hack.lu 2024 will be available on https://administraitor.video/edition/Hack.lu/2024 after each talk, provided the speaker has agreed to publish it.