Category Archives capture

The following article dives into how a UAC Bypass occur, and what to look out for if you're on the defensive side. UAC Bypass Analysis - Medium If you don't have time to read the article, it essentially boils down to this; UAC Bypasses occur very quickly - often within the same second, where as a human UAC prompt will…

Recently I've been getting more and more interested in seeing different attack vectors for attacking a host. I found the following blog post interesting on exploiting the common Samba (SMB) protocol. via LLMNR/mDNS/NBNS Spoofing, pt. 1

When thinking about tunnelling, which is encapsulating one protocol with another and then transporting that encapsulated packet across a network, you'll soon see yourself seeing terminology such as Transport, Carrier and Passenger protocols. So what is what? The┬ápassenger┬áprotocol is the protocol you want to carry over a network that does not understand it (or you do not want the network…