Investigating Power cat Reverse Shell Activity
Investigating Powercat Reverse Shell Activity OVERVIEW The primary objective of adversaries or attackers is to maintain persistence within the targeted infrastructure. To […]
Powercat : Setting Up Reverse Shells For Internal Assessments
Powercat : Setting Up Reverse Shells for Internal Assessments Moving laterally across devices to penetrate deeper into the network subsumes part of […]
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part 2
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part 2 As we proceed with our exploration of cloud storage services, […]
Diving into the World of Adversary Simulation with CRTA
Diving into the World of Adversary Simulation with Certified Red Team Analyst The Red Team Analyst [CRTA] course is designed to train […]
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part1
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part1 In today’s digital age, organisations and individuals increasingly rely on cloud […]
RedCloud OS: A Comprehensive Overview
RedCloud OS: A Comprehensive Overview RedCloud OS, the latest innovation by CW Labs Pvt. Ltd., is a Debian-derived operating system designed for […]
Decoding the Mastery of Cyber Defense: Navigating a Metasploit C2 Incident through Comprehensive Illustrations
Decoding the Mastery of Cyber Defense: Navigating a Metasploit C2 Incident through Comprehensive Illustrations OVERVIEW As we are aware that the evolution […]
Exploring Ticket Injection in Rubeus
Exploring Ticket Injection in Rubeus When it comes to the AD related operations two famous tools that I can’t possibly overlook are […]
The Anatomy of QR Code Phishing: A Tactic So Powerful, it’s Like a Sith Lord in Your Pocket
The Anatomy of QR Code Phishing: A Tactic So Powerful, it’s Like a Sith Lord in Your Pocket INTRODUCTION TO QR CODES […]