❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t

By: BHIS
11 May 2023 at 10:30

moth // IntroductionΒ  One fateful night in June of 2022, Ethan sent a message to the crew: β€œAnyone know ways to foolΒ AuditdΒ on Linux?Β I’mΒ trying to figure out how to change theΒ auidΒ (audit […]

The post Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t appeared first on Black Hills Information Security, Inc..

Avoiding Memory Scanners

22 September 2022 at 13:48

Kyle Avery // Introduction This post compliments a presentation I gave at DEF CON 30 – β€œAvoiding Memory Scanners: Customizing Malware to Evade YARA, PE-sieve, and More,” which included the […]

The post Avoiding Memory Scanners appeared first on Black Hills Information Security, Inc..

Modifying Metasploit x64 template for AV evasion

By: BHIS
21 October 2015 at 16:21

Joff Thyer // Β  When performing a penetration of test of organizations with Windows desktops, many testers will now resort to using tools like Veil’s Powershell Empire in order to […]

The post Modifying Metasploit x64 template for AV evasion appeared first on Black Hills Information Security, Inc..

❌
❌