A Red Teamer’s Guide to GPOs and OUs

wald0.com – Active Directory is a vast, complicated landscape comprised of users, computers, and groups, and the complex, intertwining permissions and privileges that connect them. The initial release of BloodHo…

Tweeted by @devilok https://twitter.com/devilok/status/980865382373146624

Read More

Do You Need To Learn Programming To Become A Hacker?

teamultimate.in – Do you need to learn programming if you want to become a hacker? This is one of the most asked questions by beginners and the answer is NO. No, you don’t need to understand all that complicated code …

Tweeted by @j0emccray https://twitter.com/j0emccray/status/980902200401649664

Read More

Invoke-DOSfuscation v1.0

securitynewspaper.com – Invoke-DOSfuscation is a PowerShell v2.0+ compatible cmd.exe command obfuscation framework. (White paper: https://www.fireeye.com/blog/threat-research/2018/03/dosfuscation-exploring-obfuscation-and-d…

Tweeted by @luchospace https://twitter.com/luchospace/status/981025390826328064

Read More

Defcon 1 Notebook Computer Security System (SEL0400)

tobem.com – During the Second World War, women pilots were given the opportunity to fly military aircraft for the first time in history. In the United States, famed aviatrix Jacqueline Cochran formed the Women A…

Tweeted by @CyberDomain https://twitter.com/CyberDomain/status/981031393756106753

Read More