❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t

By: BHIS
11 May 2023 at 10:30

moth // IntroductionΒ  One fateful night in June of 2022, Ethan sent a message to the crew: β€œAnyone know ways to foolΒ AuditdΒ on Linux?Β I’mΒ trying to figure out how to change theΒ auidΒ (audit […]

The post Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t appeared first on Black Hills Information Security, Inc..

Exploit Development – A Sincere Form of Flattery

moth // Recently, BHIS penetration tester Dale Hobbs was on an Internal Network Penetration Test and came across an RPC-based arbitrary command execution vulnerability in his vulnerability scan results.Β  I […]

The post Exploit Development – A Sincere Form of Flattery appeared first on Black Hills Information Security, Inc..

Now That’s What I Call ADHD! 4

By: BHIS
27 July 2020 at 09:42

moth & James Marrs // Introduction After a month of hard work, Python headaches, dependency hell, and a bit of tool necromancy, ADHD4 is here and we’re thrilled to share […]

The post Now That’s What I Call ADHD! 4 appeared first on Black Hills Information Security, Inc..

❌
❌