The following article dives into how a UAC Bypass occur, and what to look out for if you're on the defensive side. UAC Bypass Analysis - Medium If you don't have time to read the article, it essentially boils down to this; UAC Bypasses occur very quickly - often within the same second, where as a human UAC prompt will…
Recently I've been getting more and more interested in seeing different attack vectors for attacking a host. I found the following blog post interesting on exploiting the common Samba (SMB) protocol. via LLMNR/mDNS/NBNS Spoofing, pt. 1
Suppose you have a remote site which connects back to your corporate headquarters via a site to site VPN between two Cisco routers. To ensure the VPN is only established between operating hours, a time based access list can be used. Using the 'time-range' command allows you to set a absolute or periodic time range. Absolute is very specific in…
When thinking about tunnelling, which is encapsulating one protocol with another and then transporting that encapsulated packet across a network, you'll soon see yourself seeing terminology such as Transport, Carrier and Passenger protocols. So what is what? The passenger protocol is the protocol you want to carry over a network that does not understand it (or you do not want the network…