There are many ways to run a phishing campaign. The most common of them all is a typical credential harvesting attack, where the attacker sends an email to the target enticing them to click a link to a spoofed website. Running these campaigns are fairly straight forward, and a couple of tools make this…
Categories
n00py Blog
- Popping shells on Splunk
- Dark Tip: Avoiding SSL Inspection on Palo Alto Firewalls
- The Dangers of Client Probing on Palo Alto Firewalls
- Bypassing Duo Two-Factor Authentication (Fail Open)
- Executing Meterpreter in Memory on Windows 10 and Bypassing AntiVirus (Part 2)
- Executing Meterpreter in Memory on Windows 10 and Bypassing AntiVirus
- Ducky-in-the-middle: Injecting keystrokes into plaintext protocols
- Microsoft Word upload to Stored XSS
- Exploiting complex XSS payloads in a constrained parameter
- Bsides Puerto Rico 2017-2018 Presentation
Archives