Hak5: Metasploit Minute

Posted on Posted in Hacker News, Hak5, Threat

Metasploit Minute – the break down on breaking in. Join Mubix (aka Rob Fuller) Meterpreter Python Extension – Metasploit Minute Show Mount – Metasploit Minute Get Proxy – Metasploit Minute SLEEP! – Metasploit Minute Meterpreter Certificate Validation – Metasploit Minute Meterpreter Transports – Metasploit Minute Meterpreter Timeouts – Metasploit Minute The Meterpreter Wishlist – Metasploit […]

Bypassing McAfee’s Application Whitelisting for Critical Infrastructure Systems

Posted on Posted in Paper, Tutorial's

Introduction “McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative security features that thwart advanced persistent threats — without requiring signature updates or labor-intensive list management.” (1) McAfee Application Control is […]

NDI5aster Privilege Escalation through NDIS 5.x Filter Intermediate Drivers

Posted on Posted in Paper, Tutorial's

Introduction Security software should provide security. This is what makes research over those bits and bytes slightly more interesting than researching on other software types. The impact is not necessarily greater, since other more mainstream applications might be more widely used and commonly installed, but the word ’security’ is what makes them really attractive to […]