Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of BetaMythic 3.3 was released in a Beta six weeks ago, and since then there has been a bunch of feedback, not just about new Mythic 3.3 features but about the ...
Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover

Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover

Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still incredibly effective after all these years of abuse. Leveraging several of these NTLM relay primitives, specifically ...
Cybersecurity Trends 2024: AI, Deepfakes & More | Dan DeCloss from PlexTrac

Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac

In this episode, host Tom Eston welcomes Dan DeCloss, founder and CTO of PlexTrac. They exchange insights about their history at Veracode and explore Dan’s journey in cybersecurity. Dan shares his experience ...
Lateral Movement with the .NET Profiler

Lateral Movement with the .NET Profiler

Lateral Movement with the .NET ProfilerThe accompanying code for this blogpost can be found HERE.IntroI spend a lot of my free time modding Unity games. Since Unity is written in C#, the games are very ...
Offensive security

Offensive Security 101: Everything You Need to Know

For most, the term “offensive” evokes images of aggression and harm. But in cybersecurity, “offensive” takes on a whole new meaning: proactive, strategic, and ultimately, robust security. That’s the essence... The post ...
Mythic v3.2 Highlights: Interactive Tasking, Push C2, and Dynamic File Browser

Mythic v3.2 Highlights: Interactive Tasking, Push C2, and Dynamic File Browser

TL;DR;Mythic v3.2 has Push C2, Interactive Async Tasking, TypedArray parameters, new graphing libraries in the UI, database migrations, dynamic file browser groupings, and more!Image Generated by https://hotpot.ai/art-generatorMythic v3.2It’s been a few months since ...
Long Live the Pwn Request: Hacking Microsoft GitHub Repositories and More

Long Live the Pwn Request: Hacking Microsoft GitHub Repositories and More

Software supply chain attacks have been increasing both in frequency and severity in recent months. In response to these attacks, the CISA has even released a cybersecurity information sheet (CSI) on how ...
Helpdesk Telephone Attack: How to Close Process and Technology Gaps

Helpdesk Telephone Attack: How to Close Process and Technology Gaps

Introduction As we have witnessed in recent weeks with the MGM and Caesars Entertainment breaches, helpdesks are prime attack surfaces that are seeing a surge in exploitation. Although much of the press ...
Hacking With Your Nemesis

Hacking With Your Nemesis

In the first post in this series, On (Structured) Data, we talked about the gap area of offensive structured data and ended with the question, “If all of our offensive tools produced ...
On (Structured) Data

On (Structured) Data

IntroductionThe offensive security industry is a curious one. On the one hand, we are ahead in various trends (or “thought leadership,” as some would have us term it) and are used to ...

Application Security Check Up